Formal specification and verification of security guidelines

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Ensuring the compliance of developed software with general and application-specific security requirements is a challenging task due to the lack of automatic and formal means to lead this verification. In this paper, we present our approach that aims at integrating the formal specification and verification of security guidelines in early stages of the development lifecycle by combining the model checking together with information flow analysis. We present our framework that is based on an extension of LTS (Labeled Transition Systems) by data dependence information to cover the end-to-end specification and verification of security guidelines.

Original languageEnglish
Title of host publicationProceedings - 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing, PRDC 2017
EditorsMasato Kitakami, Dong Seong Kim, Vijay Varadharajan
PublisherIEEE Computer Society
Pages267-273
Number of pages7
ISBN (Electronic)9781509056514
DOIs
Publication statusPublished - 5 May 2017
Event22nd IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2017 - Christchurch, New Zealand
Duration: 22 Jan 201725 Jan 2017

Publication series

NameProceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC
ISSN (Print)1541-0110

Conference

Conference22nd IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2017
Country/TerritoryNew Zealand
CityChristchurch
Period22/01/1725/01/17

Keywords

  • Formal specification
  • Information Flow Analysis
  • Model Checking
  • Program Dependence Graph
  • Security Guidelines

Fingerprint

Dive into the research topics of 'Formal specification and verification of security guidelines'. Together they form a unique fingerprint.

Cite this