Skip to main content

Applying RoBuSt Method for Robustness Testing of the Non-interference Property

  • Conference paper
  • First Online:
Computer and Information Science 2015

Part of the book series: Studies in Computational Intelligence ((SCI,volume 614))

  • 530 Accesses

Abstract

When setting up a secure system, rigorous testing is important to implement and sustain a system that will induce customer confidence. In order to improve the testing process of security properties, formal methods of specification are developed to automatically generate tests. In this work, we propose to apply an approach we developed in a previous work to test the robustness of a very restrictive and important security property, which is non-interference. We consider the case of distributed component-based systems, where avoiding interference can represent a real challenge, especially when exchanging messages between heterogeneous entities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abdellatif, T., Sfaxi, L., Robbana, R., Lakhnech, Y.: Automating information flow control in component-based distributed systems. In: Proceedings of the 14th International ACM Sigsoft Symposium on Component Based Software Engineering, CBSE’11, pp. 73–82. ACM, New York (2011)

    Google Scholar 

  2. Alur, R., Dill, D.L.: A theory of timed automata. Theor. Comput. Sci. 126(2), 183–235 (1994)

    Google Scholar 

  3. Csallner, C., Smaragdakis, Y.: Check ‘n’ crash: combining static checking and testing. In: Proceedings of the 27th International Conference on Software Engineering, 2005, pp. 422–431 (2005)

    Google Scholar 

  4. Dix, M., Hofmann, H.D.: Automated software robustness testing—static and adaptive test case design methods. In: Proceedings of the 28th International Conference on Euromicro Conference, pp. 62–66 (2002)

    Google Scholar 

  5. Du, W., Mathur, A.P.: Vulnerability testing of software system using fault injection. Technical report (1998)

    Google Scholar 

  6. Eyers, D.M., Roberts, B., Bacon, J., Papagiannis, I., Migliavacca, M., Pietzuch, P., Shand, B.: Event-processing middleware with information flow control. In: Proceedings of the 10th ACM/IFIP/USENIX International Conference on Middleware, Middleware’09, pp. 32:1–32:2. Springer, New York (2009)

    Google Scholar 

  7. Fournet, C., Guernic, G.L., Rezk, T.: A security-preserving compiler for distributed programs: from information-flow policies to cryptographic mechanisms. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS’09. ACM, New York (2009)

    Google Scholar 

  8. Fu, Y., Kon, O.: Security and robustness by protocol testing. IEEE Syst. J. 1, 99 (2012)

    Google Scholar 

  9. Goguen, J.A., Meseguer, J.: Security policies and security models. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 11–20 (1982)

    Google Scholar 

  10. Helmy, A., Gupta, S.: Fotg: fault-oriented stress testing of ip multicast. IEEE Commun. Lett. 9(4), 375–377 (2005)

    Article  Google Scholar 

  11. Hessel, A., Larsen, K.G., Mikuèionis, M., Nielsen, B., Pettersson, P., Skou, A.: Testing real-time systems using uppaal (2008)

    Google Scholar 

  12. Khair, M., Mavridis, I., Pangalos, G.: Design of secure distributed medical database systems. In: Proceedings of the International Conference on Database and Expert systems Applications (1998)

    Google Scholar 

  13. Krohn, M.: Information flow control for standard os abstractions. In: Proceedings of Twenty-first ACM SIGOPS Symposium on Operating Systems Principles, SOSP’07, ACM. New York (2007)

    Google Scholar 

  14. Myers, A.C., Liskov, B.: Protecting privacy using the decentralized label model. ACM Trans. Softw. Eng. Methodol. (TOSEM) 9(4), 410–442 (2000)

    Article  Google Scholar 

  15. Myers, A.C., Sabelfeld, A., Zdancewic, S.: Enforcing robust declassification and qualified robustness. J. Comput. Secur. 14(2), 157–196 (2006)

    Google Scholar 

  16. Naceur, M., Sfaxi, L., Robbana, R.: Robustness testing for secure wireless sensor network. In: Proceedings of the International Conference on Automation, Control, Engineering and Computer Science, ACECS’14, Monastir, Tunisia (2014)

    Google Scholar 

  17. Upsala University. Uppaal tool. www.uppaal.org (2014)

  18. Zdancewic, S., Zheng, L., Nystrom, N., Myers, A.C.: Secure program partitioning. ACM Trans. Comput. Syst. 20(3), 283–328 (2002)

    Article  Google Scholar 

  19. Zeldovich, N., Boyd-Wickizer, S., Mazières, D.: Securing distributed systems with information flow control. In: Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, NSDI’08, pp. 293–308. USENIX Association, Berkeley (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Maha Naceur or Lilia Sfaxi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Naceur, M., Sfaxi, . (2016). Applying RoBuSt Method for Robustness Testing of the Non-interference Property. In: Lee, R. (eds) Computer and Information Science 2015. Studies in Computational Intelligence, vol 614. Springer, Cham. https://doi.org/10.1007/978-3-319-23467-0_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23467-0_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23466-3

  • Online ISBN: 978-3-319-23467-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics