SysML models and model transformation for security

Florian Lugou, Letitia W. Li, Ludovic Apvrille, Rabéa Ameur-Boulifa

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The security flaws of embedded systems have become very valuable targets for cyber criminals. SysML-Sec has been introduced to target the security of these systems during their development stages. However, assessing resistance to attacks during these stages requires efficiently capturing the system's behavior and formally proving security properties from those behaviors. This paper thus proposes (i) novel SysML block and state machine diagrams enhanced to better capture security features, and (ii) a model-to-Proverif transformation. ProVerif is a toolkit first released for the formal analysis of security protocol, but it can be used more generally to assess confidentiality and authenticity properties. This paper demonstrates the soundness of our approach using a complex asymmetric key distribution protocol.

Original languageEnglish
Title of host publicationMODELSWARD 2016 - Proceedings of the 4th International Conference on Model-Driven Engineering and Software Development
EditorsSlimane Hammoudi, Luis Ferreira Pires, Bran Selic, Philippe Desfray
PublisherSciTePress
Pages331-338
Number of pages8
ISBN (Electronic)9789897581687
DOIs
Publication statusPublished - 1 Jan 2016
Externally publishedYes
Event4th International Conference on Model-Driven Engineering and Software Development, MODELSWARD 2016 - Rome, Italy
Duration: 19 Feb 201621 Feb 2016

Publication series

NameMODELSWARD 2016 - Proceedings of the 4th International Conference on Model-Driven Engineering and Software Development

Conference

Conference4th International Conference on Model-Driven Engineering and Software Development, MODELSWARD 2016
Country/TerritoryItaly
CityRome
Period19/02/1621/02/16

Keywords

  • Model Transformation
  • Model-driven Engineering
  • ProVerif
  • Security
  • SysML-Sec
  • TTool

Fingerprint

Dive into the research topics of 'SysML models and model transformation for security'. Together they form a unique fingerprint.

Cite this