期刊文献+

基于多维度抽象和广度优先搜索空间划分的隐蔽信息流检测方法 被引量:1

Covert information flow detection based on multi-dimensional abstract and breadth first verification space division
下载PDF
导出
摘要 隐蔽信息流检测是开发可信计算机系统中的关键问题,而状态空间爆炸是基于状态机模型检测隐蔽信息流的主要障碍。提出一种多安全级系统中基于主体安全级的二维抽象方法,在此基础上设计了广度优先的搜索空间划分方法,使得划分变量的选取范围更大,扩展了搜索空间划分的应用范围,克服了深度优先划分方法中划分变量难以选取的问题。实验数据表明,结合抽象和搜索空间划分的方法有效降低了模型的验证规模,因此有效缓解了状态空间爆炸问题。 The detection of covert information flow is a key problem in developing secure systems. State space explosion is the main obstacle to the detection of covert information flow identification through the state machine model. This paper proposed a two-dimensional abstract method for the subject in multi-level security system. Thereafter,it proposed a verification space division method based on breadth first searching strategy. Compared with the known similar algorithms,this method enlarged the division variables candidates and thereby easier to be implemented in practice. Experiment data shows that the combination of multi-dimensional abstract and verification space division method effectively reduces the scale of verification model,and mitigates the state space explosion problem.
作者 王昌达 朱锦
出处 《计算机应用研究》 CSCD 北大核心 2016年第5期1533-1536,1541,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(61300228) 江苏省科技支撑计划资助项目(BE2013103) 江苏省六大人才高峰资助项目(1631170006) 江苏大学拔尖人才计划资助项目(1213000013)
关键词 隐蔽信息流 抽象 搜索空间划分 模型检测 covert information flow abstract verification space division model checking
  • 相关文献

参考文献19

  • 1卿斯汉.高安全等级安全操作系统的隐蔽通道分析[J].软件学报,2004,15(12):1837-1849. 被引量:31
  • 2Kemmerer R A. Shared resource matrix methodology: an approach to identifying storage and timing channels [ J]. AGM Trans on Com- puter Systems, 1983,1 (3) : 256-277.
  • 3Kemmerer R A, Porras P A. Covert flow trees: a visual approach to analyzing covert storage channels[ J]. IEEE Trans on Software En- gineering, 1991,17 ( 11 ) : 1166-1185.
  • 4Goguen J A, Meseguer J. Security policies and security models[ C]// Proe of IEEE Symposium on Security and Privacy. 1982 : 11-21.
  • 5Clarke E M, Grumberg O, Peled D. Model checking[ M ]. [ S. 1. ] : MIT Press, 1999.
  • 6Clarke E M, Grumberg O, Long D E. Model checking and abstrac- tion[ J]. ACM Trans on Programming Languages and Sys- tems, 1994,16(5) : 1512-1542.
  • 7Dams D, Gerth R, Grumberg O. Abstract interpretation of reactive systems[J]. ACM Trans on Programming Languages and Sys- tems, 1997,19(2) : 253-291.
  • 8Dams D. Abstraction in software model checking: principles and prac- tice, in model checking software [ C ]//Proc of the 9th International SPIN Workshop on Model Checking Software. Berlin:Springer, 2002: 14-21.
  • 9Berezin S, Campos S, Clarke E M. Compositional reasoning in model checking[ C ]//Proc of International Symposium on Compositionality: The Significant Difference. Berlin: Springer,1998:81-102.
  • 10McMillan K L. Verification of infinite state systems by compositional model checking[ C ]//Proc of the 10th IFIP WGIO. 5 Advanced Re- search Working Conference on Correct Hardware Design and Verifica- tion Methods. Berlin : Springer, 1999:219-237.

二级参考文献143

  • 1卿斯汉,朱继锋.安胜安全操作系统的隐蔽通道分析[J].软件学报,2004,15(9):1385-1392. 被引量:19
  • 2卿斯汉.高安全等级安全操作系统的隐蔽通道分析[J].软件学报,2004,15(12):1837-1849. 被引量:31
  • 3王昌达,鞠时光.隐通道的仿真分析[J].系统仿真学报,2006,18(6):1488-1492. 被引量:5
  • 4刘文清,韩乃平,陈喆.一个安全操作系统SLinux隐蔽通道标识与处理[J].电子学报,2007,35(1):153-156. 被引量:9
  • 5Peled D. All from one, one for all, on model-checking using representatives. Lecture Notes in Computer Science 697, CAV, 1993, pp.409-423.
  • 6Peled D. Ten years of partial order reduction. Lecture Notes in Computer Science 1427, Vancouver, Canada,CAV, 1998, pp.17-28.
  • 7Holzmann G J. The model checker Spin. IEEE Trans.Software Engineering, May 1997, 23(5): 279-295.
  • 8Berezin S, Campos S, Clarke E M. Compositional reasoning in model checking. Lecture Notes in Computer Science 1536, COMPOS, 1997, pp.81-102.
  • 9Millett L I, Teitelbaum T. Issues in slicing PROMELA and its applications to model checking, protocol understanding, and simulation. STTT, 2000, 2(4): 343-349.
  • 10Emerson E A. Temporal and modal logic. Handbook of Theoretical Computer Science, 1990, (B): 997-1072.

共引文献79

同被引文献12

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部