Formal specification of security guidelines for program certification

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Secure software can be obtained out of two distinct processes: security by design, and security by certification. The former approach has been quite extensively formalized as it builds upon models, which are verified to ensure security properties are attained and from which software is then derived manually or automatically. In contrast, the latter approach has always been quite informal in both specifying security best practices and verifying that the code produced conforms to them. In this paper, we focus on the latter approach and describe how security guidelines might be captured by security experts and verified formally by developers. Our technique relies on abstracting actions in a program based on modularity, and on combining model checking together with information flow analysis. Our goal is to formalize the existing body of knowledge in security best practices using formulas in the MCL language and to conduct formal verifications of the conformance of programs with such security guidelines. We also discuss our first results in creating a methodology for the formalization of security guidelines.

Original languageEnglish
Title of host publicationProceedings - 11th International Symposium on Theoretical Aspects of Software Engineering, TASE 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1-8
Number of pages8
ISBN (Electronic)9781538619247
DOIs
Publication statusPublished - 2 Jul 2017
Externally publishedYes
Event11th International Symposium on Theoretical Aspects of Software Engineering, TASE 2017 - Sophia Antipolis, France
Duration: 13 Sept 201715 Sept 2017

Publication series

NameProceedings - 11th International Symposium on Theoretical Aspects of Software Engineering, TASE 2017
Volume2018-January

Conference

Conference11th International Symposium on Theoretical Aspects of Software Engineering, TASE 2017
Country/TerritoryFrance
CitySophia Antipolis
Period13/09/1715/09/17

Keywords

  • Information Flow Analysis
  • Labelled Transition Systems
  • Model Checking
  • Program Certification
  • Security Best Practices
  • Security Guidelines

Fingerprint

Dive into the research topics of 'Formal specification of security guidelines for program certification'. Together they form a unique fingerprint.

Cite this