Abstract
The Mondex case study concerns the formal development and verification of an electronic purse protocol. Several groups have worked on its specification and mechanical verification, their solutions being (as were ours previously), either one big step or several steps motivated by the task’s complexity. A new solution is presented that is structured into three refinements, motivated by the three concepts underlying Mondex: a message protocol to transfer money over a lossy medium, protection against replay attacks, and uniqueness of transfers using sequence numbers. We also give an improved proof technique based on our theoretical results on verifying interleaved systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
MasterCard International Inc.: Mondex, http://www.mondex.com
UK ITSEC Certification Body: UK ITSEC Scheme Certification Report No. P129 MONDEX Purse. Technical report (1999), http://www.cesg.gov.uk/site/iacs/itsec/media/certreps/CRP129.pdf
CCIB: Common Criteria for Information Technology Security Evaluation, Version 3.1 (ISO 15408) (November 2007), http://csrc.nist.gov/cc
Stepney, S., Cooper, D., Woodcock, J.: An Electronic Purse: Specification, Refinement, and Proof. Technical monograph PRG-126, Oxford University Computing Lab (2000), http://www-users.cs.york.ac.uk/susan/bib/ss/z/monog.htm
Spivey, J.M.: The Z Notation: A Reference Manual, 2nd edn. PHI (1992)
Woodcock, J.: First Steps in the Verified Software Grand Challenge. IEEE Computer 39(10), 57–64 (2006)
Jones, C., Woodcock, J. (eds.): Formal Aspects of Computing, vol. 20 (1). Springer, Heidelberg (January 2008)
Schellhorn, G., Grandy, H., Haneberg, D., Reif, W.: The Mondex Challenge: Machine Checked Proofs for an Electronic Purse. In: Misra, J., Nipkow, T., Sekerinski, E. (eds.) FM 2006. LNCS, vol. 4085, pp. 16–31. Springer, Heidelberg (2006)
Cooper, D., Stepney, S., Woodcock, J.: Derivation of Z Refinement Proof Rules. Technical Report YCS-2002-347, University of York (2002), http://www-users.cs.york.ac.uk/susan/bib/ss/z/zrules.htm
Gurevich, Y.: Evolving Algebras 1993: Lipari Guide. In: Börger, E. (ed.) Specification and Validation Methods, pp. 9–36. Oxford Univ. Press, Oxford (1995)
Börger, E., Stärk, R.F.: Abstract State Machines—A Method for High-Level System Design and Analysis. Springer, Heidelberg (2003)
Schellhorn, G., Grandy, H., Haneberg, D., Moebius, N., Reif, W.: A Systematic Verification Approach for Mondex Electronic Purses using ASMs. In: Dagstuhl Seminar on Rigorous Methods for Software Construction and Analysis. LNCS, Springer, Heidelberg (2008); (older version available as Techn. Report 2006-27 at [24])
Börger, E., Rosenzweig, D.: The WAM—Definition and Compiler Correctness. In: Logic Programming: Formal Methods and Practical Applications. Studies in CS and AI, vol. 11, pp. 20–90. North-Holland, Amsterdam (1995)
Schellhorn, G.: Verification of ASM Refinements Using Generalized Forward Simulation. J.UCS 7(11), 952–979 (2001)
Börger, E.: The ASM Refinement Method. FAC 15 (1-2), 237–257 (2003)
Schellhorn, G.: ASM Refinement and Generalizations of Forward Simulation in Data Refinement: A Comparison. TCS 336, 403–435 (2005)
Schellhorn, G.: ASM Refinement Preserving Invariants. In: Proceedings of the ASM workshop 2007, Grimstad, Norway (2008) (to appear in J.UCS)
Banach, R., Jeske, C., Poppleton, M., Stepney, S.: Retrenching the Purse: The Balance Enquiry Quandary, and Generalised and (1,1) Forward Refinements. Fund. Inf. 77, 29–69 (2007)
Butler, M., Yadav, D.: An Incremental Development of the Mondex System in Event-B. FAC 20(1) (January 2008)
Haxthausen, A., George, C.: Specification, Proof, and Model Checking of the Mondex Electronic Purse using RAISE. FAC 20(1) (January 2008)
Haneberg, D., Schellhorn, G., Grandy, H., Reif, W.: Verification of Mondex Electronic Purses with KIV: From Transactions to a Security Protocol. Formal Aspects of Computing 20(1) (January 2008)
Moebius, N., Haneberg, D., Schellhorn, G., Reif, W.: A Modeling Framework for the Development of Provably Secure E-Commerce Applications. In: International Conference on Software Engineering Advances (ICSEA). IEEE Press, Los Alamitos (2007), http://ieeexplore.ieee.org
Grandy, H., Bischof, M., Schellhorn, G., Reif, W., Stenzel, K.: Verification of Mondex Electronic Purses with KIV: From a Security Protocol to Verified Code. In: Cuellar, J., Maibaum, T.S.E. (eds.) FM 2008. LNCS, vol. 5014. Springer, Heidelberg (2008)
Mondex KIV: Web presentation of the Mondex case study in KIV, http://www.informatik.uni-augsburg.de/swt/projects/mondex.html
Banach, R., Schellhorn, G.: On the Refinement of Atomic Actions. In: Proceedings of REFINE 2007. ENTCS, vol. 201, pp. 3–30 (2007)
Banach, R., Schellhorn, G.: Atomic Actions, and their Refinements to Isolated Protocols. In: FAC (2008)
Harel, D., Kozen, D., Tiuryn, J.: Dynamic Logic. MIT Press, Cambridge (2000)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Schellhorn, G., Banach, R. (2008). A Concept-Driven Construction of the Mondex Protocol Using Three Refinements. In: Börger, E., Butler, M., Bowen, J.P., Boca, P. (eds) Abstract State Machines, B and Z. ABZ 2008. Lecture Notes in Computer Science, vol 5238. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-87603-8_6
Download citation
DOI: https://doi.org/10.1007/978-3-540-87603-8_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-87602-1
Online ISBN: 978-3-540-87603-8
eBook Packages: Computer ScienceComputer Science (R0)