The Guided System Development Framework: Modeling and Verifying Communication Systems

In a world that increasingly relies on the Internet to function, application developers rely on the implementations of protocols to guarantee the security of data transferred. Whether a chosen protocol gives the required guarantees, and whether the implementation does the same, is usually unclear. The Guided System Development framework contributes to more secure communication systems by aiding the development of such systems. The framework features a simple modelling language, step-wise refinement from models to implementation, interfaces to security verification tools, and code generation from the verified specification. The refinement process carries thus security properties from the model to the implementation. Our approach also supports verification of systems previously developed and deployed. Internally, the reasoning in our framework is based on the Beliefs and Knowledge tool, a verification tool based on belief logics and explicit attacker knowledge.

[1]  E. Valovage Enhanced ADS-B Research , 2007, IEEE Aerospace and Electronic Systems Magazine.

[2]  Richard Barhydt,et al.  Development of Intent Information Changes to Revised Minimum Aviation System Performance Standards for Automatic Dependent Surveillance Broadcast (RTCA/DO-242A) , 2002 .

[3]  A.D. Lazarov,et al.  Isar Signal Modeling and Image Reconstruction with Entropy Minimization Autofocussing , 2006, 2006 ieee/aiaa 25TH Digital Avionics Systems Conference.

[4]  Dawn Xiaodong Song,et al.  Athena: A Novel Approach to Efficient Automatic Security Protocol Analysis , 2001, J. Comput. Secur..

[5]  Mikael Buchholtz,et al.  User ’ s Guide for the LySatool version 2 . 01 , 2005 .

[6]  Peter B. Hirtle,et al.  Authenticity in a Digital Environment. , 2000 .

[7]  D. Hall,et al.  Enhanced ADS-B research , 2006, 2006 IEEE Aerospace Conference.

[8]  Nobuko Yoshida,et al.  Structured Communication-Centred Programming for Web Services , 2007, ESOP.

[9]  Andrew D. Gordon,et al.  Verified Interoperable Implementations of Security Protocols , 2006, CSFW.

[10]  Nikolaj Bjørner,et al.  Z3: An Efficient SMT Solver , 2008, TACAS.

[11]  Bruno Blanchet,et al.  An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..

[12]  Flemming Nielson,et al.  Static validation of security protocols , 2005, J. Comput. Secur..

[13]  P. Syverson,et al.  A Unified Cryptographic Protocol Logic , 1996 .

[14]  Juan Chen,et al.  Secure distributed programming with value-dependent types , 2013, J. Funct. Program..

[15]  Flemming Nielson,et al.  Protocol Stacks for Services , 2009 .

[16]  Bruno Blanchet,et al.  From Computationally-proved Protocol Specifications to Implementations , 2012, 2012 Seventh International Conference on Availability, Reliability and Security.

[17]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[18]  Flemming Nielson,et al.  On Building Secure Communication Systems , 2013 .

[19]  P. Cogn,et al.  A Computationally Sound Mechanized Prover for Security Protocols , 2009 .

[20]  Dawn Xiaodong Song,et al.  AGVI - Automatic Generation, Verification, and Implementation of Security Protocols , 2001, CAV.

[21]  Sebastian Mödersheim,et al.  The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols , 2009, FOSAD.

[22]  Sebastian Mödersheim,et al.  Algebraic Properties in Alice and Bob Notation , 2009, 2009 International Conference on Availability, Reliability and Security.

[23]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[24]  Flemming Nielson,et al.  The Succinct Solver Suite , 2004, TACAS.