Tracking dependent information flows

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Ensuring the compliance of developed software with security requirements is a challenging task due to imprecision on the security guidelines definition, and to the lack of automatic and formal means to lead this verification. In this paper, we present our approach that aims at integrating the formal specification and verification of security guidelines in early stages of the development life cycle by combining the model checking together with information flow analysis. We formally specify security guidelines that involve dependent information flows as a basis to lead formal verification through model checking, and provide precise feedback to the developer.

Original languageEnglish
Title of host publicationICISSP 2017 - Proceedings of the 3rd International Conference on Information Systems Security and Privacy
EditorsPaolo Mori, Steven Furnell, Olivier Camp
PublisherSciTePress
Pages179-189
Number of pages11
ISBN (Electronic)9789897582097
DOIs
Publication statusPublished - 1 Jan 2017
Event3rd International Conference on Information Systems Security and Privacy, ICISSP 2017 - Porto, Portugal
Duration: 19 Feb 201721 Feb 2017

Publication series

NameICISSP 2017 - Proceedings of the 3rd International Conference on Information Systems Security and Privacy
Volume2017-January

Conference

Conference3rd International Conference on Information Systems Security and Privacy, ICISSP 2017
Country/TerritoryPortugal
CityPorto
Period19/02/1721/02/17

Keywords

  • Formal Specification
  • Information Flow Analysis
  • Labeled Transition System
  • Model Checking
  • Program Dependence Graph
  • Security Guidelines

Fingerprint

Dive into the research topics of 'Tracking dependent information flows'. Together they form a unique fingerprint.

Cite this