Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Abstract

In a world that increasingly relies on the Internet to function, application developers rely on the implementations of protocols to guarantee the security of data transferred. Whether a chosen protocol gives the required guarantees, and whether the implementation does the same, is usually unclear. The Guided System Development framework contributes to more secure communication systems by aiding the development of such systems. The framework features a simple modelling language, step-wise refinement from models to implementation, interfaces to security verification tools, and code generation from the verified specification. The refinement process carries thus security properties from the model to the implementation. Our approach also supports verification of systems previously developed and deployed. Internally, the reasoning in our framework is based on the Beliefs and Knowledge tool, a verification tool based on belief logics and explicit attacker knowledge.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Quaresma, J., Probst, C.W., Nielson, F.: The Guided System Development Framework. In: Pettersson, P., Seceleanu, C. (eds.) Proceedings of the 23rd Nordic Workshop Programming Theory, Västerås, Sweden, pp. 69–72 (October 2011)

    Google Scholar 

  2. Quaresma, J.: On Building Secure Communication Systems. PhD thesis, Technical University of Denmark (2013)

    Google Scholar 

  3. Gao, H., Nielson, F., Nielson, H.: Protocol Stacks for Services. In: Foundations of Computer Security (2009)

    Google Scholar 

  4. Song, D., Perrig, A., Phan, D.: Agvi—automatic generation, verification, and implementation of security protocols. In: Berry, G., Comon, H., Finkel, A. (eds.) CAV 2001. LNCS, vol. 2102, pp. 241–245. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  5. Song, D.X., Berezin, S., Perrig, A.: Athena: A novel approach to efficient automatic security protocol analysis. Journal of Computer Security 9(1), 47–74 (2001)

    Google Scholar 

  6. Bhargavan, K., Fournet, C., Gordon, A.D., Tse, S.: Verified interoperable implementations of security protocols. ACM Transactions on Programming Languages and Systems (TOPLAS) 31(1), 5 (2008)

    Article  Google Scholar 

  7. Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: Proceedings of te 14th IEEE Computer Security Foundations Workshop, pp. 82–96 (2001)

    Google Scholar 

  8. Swamy, N., Chen, J., Fournet, C., Strub, P.Y., Bhargavan, K., Yang, J.: Secure distributed programming with value-dependent types. In: Proceeding of the 16th ACM SIGPLAN International Conference on Functional Programming, ICFP 2011, pp. 266–278. ACM, New York (2011)

    Google Scholar 

  9. Cade, D., Blanchet, B.: From computationally-proved protocol specifications to implementations. In: 2012 International Conference on Availability, Reliability and Security (ARES), pp. 65–74. IEEE (2012)

    Google Scholar 

  10. Blanchet, B.: A computationally sound mechanized prover for security protocols. IEEE Transactions on Dependable and Secure Computing 5(4), 193–207 (2008)

    Article  Google Scholar 

  11. Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst. 8, 18–36 (1990)

    Article  Google Scholar 

  12. Syverson, P.: A unified cryptographic protocol logic. Technical report, DTIC Document (1996)

    Google Scholar 

  13. Dolev, D., Yao, A.: On the security of public key protocols. IEEE Transactions on Information Theory IT-29(2), 198–208 (1983)

    Google Scholar 

  14. Cullen, C.T., Hirtle, P.B., Levy, D., Lynch, C.A., Rothenberg, J.: Authenticity in a digital environment (2000)

    Google Scholar 

  15. Carbone, M., Honda, K., Yoshida, N.: Structured communication-centred programming for web services. In: De Nicola, R. (ed.) ESOP 2007. LNCS, vol. 4421, pp. 2–17. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  16. de Moura, L., Bjørner, N.: Z3: An efficient SMT solver. In: Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. LNCS, vol. 4963, pp. 337–340. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  17. Buchholtz, M.: User’s Guide for the LySatool version 2.01. DTU (April 2005)

    Google Scholar 

  18. Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Nielson, H.: Static validation of security protocols. Journal of Computer Security 13(3), 347–390 (2005)

    Google Scholar 

  19. Nielson, F., Riis Nielson, H., Sun, H., Buchholtz, M., Rydhof Hansen, R., Pilegaard, H., Seidl, H.: The succinct solver suite. In: Jensen, K., Podelski, A. (eds.) TACAS 2004. LNCS, vol. 2988, pp. 251–265. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  20. Mödersheim, S., Viganò, L.: The open-source fixed-point model checker for symbolic analysis of security protocols. In: Aldini, A., Barthe, G., Gorrieri, R. (eds.) FOSAD 2007/2008/2009. LNCS, vol. 5705, pp. 166–194. Springer, Heidelberg (2009)

    Google Scholar 

  21. AVISPA: Deliverable 2.3: The intermediate format (2003), http://www.avispa-project.org

  22. Mödersheim, S.: Algebraic Properties in Alice and Bob Notation. In: 2009 International Conference on Availability, Reliability and Security (ARES), pp. 433–440. IEEE (2009)

    Google Scholar 

  23. RTCA: DO-242A: Minimum Aviation System Performance Standards for Automatic Dependent Surveillance Broadcast (ADS-B). Technical report, RTCA (2002)

    Google Scholar 

  24. Valovage, E.: Enhanced ADS-B Research. In: 2006 IEEE/AIAA 25th Digital Avionics Systems Conference, pp. 1–7 (October 2006)

    Google Scholar 

  25. Viggiano, M., Valovage, E., et al.: Secure ADS-B Authentication System and Method (October 12, 2007), WO Patent 2,007,115,246

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Quaresma, J., Probst, C.W., Nielson, F. (2014). The Guided System Development Framework: Modeling and Verifying Communication Systems. In: Margaria, T., Steffen, B. (eds) Leveraging Applications of Formal Methods, Verification and Validation. Specialized Techniques and Applications. ISoLA 2014. Lecture Notes in Computer Science, vol 8803. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45231-8_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-45231-8_42

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-45230-1

  • Online ISBN: 978-3-662-45231-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics