Skip to main content

Verifying Abstract Information Flow Properties in Fault Tolerant Security Devices

  • Conference paper
Formal Methods and Software Engineering (ICFEM 2006)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 4260))

Included in the following conference series:

Abstract

The verification of information flow properties of security devices is difficult because it involves the analysis of schematic diagrams, artwork, embedded software, etc. In addition, a typical security device has many modes, partial information flow, and needs to be fault tolerant. We propose a new approach to the verification of such devices based upon checking abstract information flow properties expressed as graphs. This approach has been implemented in software, and successfully used to find possible paths of information flow through security devices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. ISO/IEC 13568, Information Technology—Z Formal Specification Notation—Syntax, Type System and Semantics, 1st edn. 2002-07-01 (2002)

    Google Scholar 

  2. Behnke, R., Berghammer, R., Meyer, E., Schneider, P.: RELVIEW – a system for calculating with relations and relational programming. In: Astesiano, E. (ed.) ETAPS 1998 and FASE 1998. LNCS, vol. 1382, pp. 318–321. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  3. Clarke, E., Grumberg, O., Jha, S., Lu, Y., Veith, H.: Counterexample-guided abstraction refinement for symbolic model checking. J. ACM 50(5), 752–794 (2003)

    Article  MathSciNet  Google Scholar 

  4. Clarke, E.M., Grumberg, O., Peled, D.A.: Model checking. MIT Press, Cambridge (1999)

    Google Scholar 

  5. Fidge, C., McComb, T.: Tracing information flow through mode changes. In: Estivill-Castro, V., Dobbie, G. (eds.) Twenty-Ninth Australasian Computer Science Conference (ACSC 2006), Hobart, Australia. CRPIT, vol. 48, pp. 303–310. ACS (2006)

    Google Scholar 

  6. McComb, T., Wildman, L.: SIFA: A tool for evaluation of high-grade security devices. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 230–241. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  7. MIL-STD. Procedures for performing a failure mode, effects and criticality analysis. Department of Defense USA (1629A)

    Google Scholar 

  8. U. S. Nuclear Regulatory Commission NRC. Fault Tree Handbook. NUREG-0492, Springfield (1981)

    Google Scholar 

  9. Rae, A., Fidge, C.: Identifying critical components during information security evaluations. Journal of Research and Practice in Information Technology 37(4) (November 2005)

    Google Scholar 

  10. Rae, A., Fidge, C., Wildman, L.: Fault evaluation for security-critical communications devices. Computer 39(5), 61–68 (2006)

    Article  Google Scholar 

  11. Rae, A., Fidge, C., Wildman, L.: Information security fault mode evaluation for communications devices. IEEE Computer 39(3) (March 2006)

    Google Scholar 

  12. Rae, A.J., Fidge, C.J.: Information flow analysis for fail-secure devices. The Computer Journal 48(1), 17–26 (2005)

    Article  Google Scholar 

  13. Rushby, J.: Noninterference, transitivity, and channel-control security policies. Technical Report CSL-92-02, Computer Science Laboratory, SRI International (December 1992)

    Google Scholar 

  14. Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE Journal on Selected Areas in Communications 21(1), 5–19 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

McComb, T., Wildman, L. (2006). Verifying Abstract Information Flow Properties in Fault Tolerant Security Devices. In: Liu, Z., He, J. (eds) Formal Methods and Software Engineering. ICFEM 2006. Lecture Notes in Computer Science, vol 4260. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11901433_34

Download citation

  • DOI: https://doi.org/10.1007/11901433_34

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-47460-9

  • Online ISBN: 978-3-540-47462-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics