2014
DOI: 10.4018/978-1-4666-4490-8.ch006
|View full text |Cite
|
Sign up to set email alerts
|

Application of Verification Techniques to Security

Abstract: In this chapter, the authors give a short overview of the state of the art of formal verification techniques to the engineering of safe and secure systems. The main focus is on the support of security of real-world systems with mechanized verification techniques, in particular model checking. Based on prior experience with safety analysis—in particular the TWIN elevator (ThyssenKrupp) case study—the current case study ventures into the rising field of social engineering attacks on security. This main focus and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…We specify the goal as the negated policy, and then let the model checker find its way to a state that violates the policy. In a preliminary study [9] we have shown how this can be done for the current example (see Appendix for the MCMAS specification). To cut a long story short, we assume a secret file of user U .…”
Section: B Invalidating Policies Based On System Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…We specify the goal as the negated policy, and then let the model checker find its way to a state that violates the policy. In a preliminary study [9] we have shown how this can be done for the current example (see Appendix for the MCMAS specification). To cut a long story short, we assume a secret file of user U .…”
Section: B Invalidating Policies Based On System Modelsmentioning
confidence: 99%
“…Appendix VII-1 show the MCMAS specification for the user, and VII-2 the specification for the janitor from [9] mentioned in Section III. Appendix VII-3, finally, contains the Isabelle-experiment we conducted to support our argument about workflow policy invalidation and refinement.…”
Section: Appendixmentioning
confidence: 99%