Abstract
In a world that increasingly relies on the Internet to function, application developers rely on the implementations of protocols to guarantee the security of data transferred. Whether a chosen protocol gives the required guarantees, and whether the implementation does the same, is usually unclear. The Guided System Development framework contributes to more secure communication systems by aiding the development of such systems. The framework features a simple modelling language, step-wise refinement from models to implementation, interfaces to security verification tools, and code generation from the verified specification. The refinement process carries thus security properties from the model to the implementation. Our approach also supports verification of systems previously developed and deployed. Internally, the reasoning in our framework is based on the Beliefs and Knowledge tool, a verification tool based on belief logics and explicit attacker knowledge.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Quaresma, J., Probst, C.W., Nielson, F.: The Guided System Development Framework. In: Pettersson, P., Seceleanu, C. (eds.) Proceedings of the 23rd Nordic Workshop Programming Theory, Västerås, Sweden, pp. 69–72 (October 2011)
Quaresma, J.: On Building Secure Communication Systems. PhD thesis, Technical University of Denmark (2013)
Gao, H., Nielson, F., Nielson, H.: Protocol Stacks for Services. In: Foundations of Computer Security (2009)
Song, D., Perrig, A., Phan, D.: Agvi—automatic generation, verification, and implementation of security protocols. In: Berry, G., Comon, H., Finkel, A. (eds.) CAV 2001. LNCS, vol. 2102, pp. 241–245. Springer, Heidelberg (2001)
Song, D.X., Berezin, S., Perrig, A.: Athena: A novel approach to efficient automatic security protocol analysis. Journal of Computer Security 9(1), 47–74 (2001)
Bhargavan, K., Fournet, C., Gordon, A.D., Tse, S.: Verified interoperable implementations of security protocols. ACM Transactions on Programming Languages and Systems (TOPLAS)Â 31(1), 5 (2008)
Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: Proceedings of te 14th IEEE Computer Security Foundations Workshop, pp. 82–96 (2001)
Swamy, N., Chen, J., Fournet, C., Strub, P.Y., Bhargavan, K., Yang, J.: Secure distributed programming with value-dependent types. In: Proceeding of the 16th ACM SIGPLAN International Conference on Functional Programming, ICFP 2011, pp. 266–278. ACM, New York (2011)
Cade, D., Blanchet, B.: From computationally-proved protocol specifications to implementations. In: 2012 International Conference on Availability, Reliability and Security (ARES), pp. 65–74. IEEE (2012)
Blanchet, B.: A computationally sound mechanized prover for security protocols. IEEE Transactions on Dependable and Secure Computing 5(4), 193–207 (2008)
Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst. 8, 18–36 (1990)
Syverson, P.: A unified cryptographic protocol logic. Technical report, DTIC Document (1996)
Dolev, D., Yao, A.: On the security of public key protocols. IEEE Transactions on Information Theory IT-29(2), 198–208 (1983)
Cullen, C.T., Hirtle, P.B., Levy, D., Lynch, C.A., Rothenberg, J.: Authenticity in a digital environment (2000)
Carbone, M., Honda, K., Yoshida, N.: Structured communication-centred programming for web services. In: De Nicola, R. (ed.) ESOP 2007. LNCS, vol. 4421, pp. 2–17. Springer, Heidelberg (2007)
de Moura, L., Bjørner, N.: Z3: An efficient SMT solver. In: Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. LNCS, vol. 4963, pp. 337–340. Springer, Heidelberg (2008)
Buchholtz, M.: User’s Guide for the LySatool version 2.01. DTU (April 2005)
Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Nielson, H.: Static validation of security protocols. Journal of Computer Security 13(3), 347–390 (2005)
Nielson, F., Riis Nielson, H., Sun, H., Buchholtz, M., Rydhof Hansen, R., Pilegaard, H., Seidl, H.: The succinct solver suite. In: Jensen, K., Podelski, A. (eds.) TACAS 2004. LNCS, vol. 2988, pp. 251–265. Springer, Heidelberg (2004)
Mödersheim, S., Viganò, L.: The open-source fixed-point model checker for symbolic analysis of security protocols. In: Aldini, A., Barthe, G., Gorrieri, R. (eds.) FOSAD 2007/2008/2009. LNCS, vol. 5705, pp. 166–194. Springer, Heidelberg (2009)
AVISPA: Deliverable 2.3: The intermediate format (2003), http://www.avispa-project.org
Mödersheim, S.: Algebraic Properties in Alice and Bob Notation. In: 2009 International Conference on Availability, Reliability and Security (ARES), pp. 433–440. IEEE (2009)
RTCA: DO-242A: Minimum Aviation System Performance Standards for Automatic Dependent Surveillance Broadcast (ADS-B). Technical report, RTCA (2002)
Valovage, E.: Enhanced ADS-B Research. In: 2006 IEEE/AIAA 25th Digital Avionics Systems Conference, pp. 1–7 (October 2006)
Viggiano, M., Valovage, E., et al.: Secure ADS-B Authentication System and Method (October 12, 2007), WO Patent 2,007,115,246
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Quaresma, J., Probst, C.W., Nielson, F. (2014). The Guided System Development Framework: Modeling and Verifying Communication Systems. In: Margaria, T., Steffen, B. (eds) Leveraging Applications of Formal Methods, Verification and Validation. Specialized Techniques and Applications. ISoLA 2014. Lecture Notes in Computer Science, vol 8803. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45231-8_42
Download citation
DOI: https://doi.org/10.1007/978-3-662-45231-8_42
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-45230-1
Online ISBN: 978-3-662-45231-8
eBook Packages: Computer ScienceComputer Science (R0)