2015 11th International Conference on Network and Service Management (CNSM) 2015
DOI: 10.1109/cnsm.2015.7367384
|View full text |Cite
|
Sign up to set email alerts
|

Demonstrating topoS: Theorem-prover-based synthesis of secure network configurations

Abstract: Abstract-In network management, when it comes to security breaches, human error constitutes a dominant factor. We present our tool topoS which automatically synthesizes low-level network configurations from high-level security goals. The automation and a feedback loop help to prevent human errors. Except for a last serialization step, topoS is formally verified with Isabelle/HOL, which prevents implementation errors. In a case study, we demonstrate topoS by example. For the first time, the complete transition … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
3
1
1

Relationship

3
2

Authors

Journals

citations
Cited by 5 publications
(9 citation statements)
references
References 25 publications
0
9
0
Order By: Relevance
“…Diekmann et al presented a new tool named TopoS to manage network‐level access control. TopoS requires the high‐level security aims to translate them into low‐level configurations automatically.…”
Section: Formal Verification Methods In the Sdnmentioning
confidence: 99%
“…Diekmann et al presented a new tool named TopoS to manage network‐level access control. TopoS requires the high‐level security aims to translate them into low‐level configurations automatically.…”
Section: Formal Verification Methods In the Sdnmentioning
confidence: 99%
“…Only the generation of the target configuration must be adapted. For example, topoS can also used to generate an OpenFlow configuration [11].…”
Section: Survey Of Related Academic Workmentioning
confidence: 99%
“…This article is partly based on our previously published paper [11]. Our previous publication discusses the design phase and provides a formally-verified method to translate security requirements to a security policy ( § II).…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations