skip to main content
10.1145/1244002.1244325acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

Formal verification of security specifications with common criteria

Published:11 March 2007Publication History

ABSTRACT

This paper proposes a formalization and verification technique for security specifications, based on common criteria. Generally, it is difficult to define reliable security properties that should be applied to validate an information system. Therefore, we have applied security functional requirements that are defined in the ISO/IEC 15408 common criteria to the formal verification of security specifications. We formalized the security criteria of ISO/IEC 15408 and developed a process, using Z notation, for verifying security specifications. We also demonstrate some examples of the verification instances using the theorem prover Z/EVES. In the verification process, one can verify strictly whether specifications satisfy the security criteria defined in ISO/IEC 15408.

References

  1. Bertot, Y. and Casteran, P. Interactive Theorem Proving and Program Development. Springer-Verlag, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Clarke, E., Grumberg, O., and Peled, D. Model Checking. MIT Press, 2000.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Common Criteria Org. Evaluated Product Files. http://www.commoncriteriaportal.org/public/files/epfiles/Google ScholarGoogle Scholar
  4. Dupuy, S., Ledru, Y., and Chabre-Peccoud, M. An Overview of RoZ: A Tool for Integrating UML and Z Specifications. In Proc. of the 12th international Conference on Advanced information Systems Engineering. B. Wangler and L. Bergman, Eds. Lecture Notes in Computer Science, vol. 1789, pages. 417--430, Springer-Verlag, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Hall, A. Z Styles for Security Properties and Modern User Interfaces. In Proc. of the Formal Aspects of the First International Conference. A. E. Abdallah, P. Ryan, and S. Schneider, Eds. Lecture Notes in Computer Science, vol. 2629, pages. 152--166, Springer-Verlag, 2002.Google ScholarGoogle Scholar
  6. Hinchey, M. G. and Bowen, J. P. High-Integrity System Specification and Design. 1st. Springer-Verlag, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Horie, D., Morimoto, S., and Cheng, J. A Web User Interface of the Security Requirement Management Database Based on ISO/IEC 15408, In Proc. of Computational Science - ICCS 2006: 6th International Conference. V. N. Alexandrov et al., Eds. Lecture Notes in Computer Science, vol. 3994, pages. 797--804, Springer-Verlag, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. ISO/IEC 13568 Standard. Information Technology - Z Formal Specification Notation - Syntax, Type System and Semantics. 2002.Google ScholarGoogle Scholar
  9. ISO/IEC 15408 Standard. Information Technology - Security Techniques - Evaluation Criteria for IT Security. 1999.Google ScholarGoogle Scholar
  10. Jacob, J. Basic Theorems About Security. J. Comput. Secur. 1, 3--4, pages. 385--411, 1992.Google ScholarGoogle Scholar
  11. Long, B. W., Fidge, C. J., and Cerone, A. A Z Based Approach to Verifying Security Protocols. In Proc. of the 5th International Conference on Formal Engineering Methods. J. S. Dong and J. Wood-. cock, Eds. Lecture Notes in Computer Science, vol. 2885, pages. 375--395, Springer-Verlag, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  12. Morimoto, S. and Cheng, J. Modeling Protection Profiles by UML and their Formal Verification. Systems and Computers in Japan. Wiley, 2007.Google ScholarGoogle Scholar
  13. Morimoto, S. and Cheng, J. Patterning Protection Profiles by UML for Security Specifications. In Proc. of the international Conference on Computational intelligence For Modelling, Control and Automation and international Conference on intelligent Agents, Web Technologies and internet Commerce Vol-2 (Cimca-Iawtic'06) - Volume 02. pages. 946--951, IEEE Computer Society, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Morimoto, S., Horie, D., and Cheng, J. A Security Requirement Management Database Based on ISO/IEC 15408. In Proc. of Computational Science and Its Applications - ICCSA 2006, International Conference. M. Gavrilova et. al., Eds. Lecture Notes in Computer Science, vol. 3982, pages. 1--10, Springer-Verlag, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Oheimb, D. Interacting State Machines - a stateful approach to proving security -. In Proc. of the Formal Aspects of the First International Conference. A. E. Abdallah, P. Ryan, and S. Schneider, Eds. Lecture Notes in Computer Science, vol. 2629, pages. 15--32, Springer-Verlag, 2002.Google ScholarGoogle Scholar
  16. ORA Canada, Z/EVES. http://www.ora.on.ca/z-eves/welcome.htmlGoogle ScholarGoogle Scholar
  17. Potter, B., Till, D., and Sinclair, J. An Introduction to Formal Specification and Z. 2nd. Prentice Hall PTR, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Formal verification of security specifications with common criteria

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SAC '07: Proceedings of the 2007 ACM symposium on Applied computing
        March 2007
        1688 pages
        ISBN:1595934804
        DOI:10.1145/1244002

        Copyright © 2007 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 11 March 2007

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate1,650of6,669submissions,25%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader