Formal Validation of Software for Secure Systems

نویسندگان

  • Jacques CAZIN
  • Pierre GIRARD
  • Colin O'HALLORAN
  • Chris SENNETT
چکیده

This paper presents the work currently conducted in the \DS 3 " project 1 which is concerned with the integration and formal validation of oo-the-shelf components in secure systems. It explores two alternate approaches: a top-down approach of encapsulating application components into interoperating controlled modules and checks their assembly; and a bottom-up approach which checks the absence of information ows by examining individual modules. Each of these approaches are eeective at the source or intermediate code level. A pragmatic methodology is given together with an illustrative case study which implements le transfers through a network between machines working at diierent security levels.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Computationally secure multiple secret sharing: models, schemes, and formal security analysis

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

متن کامل

Validating a High-Performance, Programmable Secure Coprocessor

This paper details our experiences with successfully validating a trusted device at FIPS 140-1 Level 4—earning the world’s first certificate at this highest level. Over the last several years, our group designed and built a physically secure PCI card (the IBM 4758 [5]) containing a general-purpose processor with crypto support. However, for this device to function as a trusted platform for secu...

متن کامل

On confidentiality and formal methods

The contemporary challenge of engineering verifiably secure software has motivated various techniques for measuring and regulating the flow of confidential data from systems to their users. Unfortunately, these techniques suffer from a lack of integration with modern formal methods for software development, which inhibits their application in practice. This thesis proposes a novel approach for ...

متن کامل

Applying Practical Formal Methods to the Speci cation and Analysis of Security Properties

The SCR (Software Cost Reduction) toolset contains tools for specifying, debugging, and verifying system and software requirements. The utility of the SCR tools in detecting speci cation errors, many involving safety properties, has been demonstrated recently in projects involving practical systems, such as the International Space Station, a ight guidance system, and a U.S. weapons system. This...

متن کامل

Applying Practical Formal Methods to the Specification and Analysis of Security Properties

The SCR (Software Cost Reduction) toolset contains tools for specifying, debugging, and verifying system and software requirements. The utility of the SCR tools in detecting speciication errors, many involving safety properties, has been demonstrated recently in projects involving practical systems, such as the International Space Station , a ight guidance system, and a U.S. weapons system. Thi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1995