期刊文献+

XSM语义模型及安全需求形式化验证 被引量:1

XSM SEMANTIC MODEL AND FORMAL VERIFICATION OF SECURITY REQUIREMENTS
下载PDF
导出
摘要 Xen作为一种开源流行的虚拟化工具,使用越来越频繁。作为Xen的安全框架XSM(Xen Security Module)也受到广泛的关注。许多研究者通过形式化的方式对现有的操作系统进行正确性的验证,目前已有的形式化研究主要是验证系统实现的代码正确性。从系统功能角度提出了一种以主体行为为操作系统语义模型对系统进行形式化建模,并采用CTL时序逻辑对XSM安全需求进行分析。语义模型作为系统设计合理性和形式化验证的联系,对XSM进行形式化验证,并使用Isabelle/HOL验证功能和安全需求的一致性,以说明XSM是否符合安全需求。 As a popular open-source virtualization tools, Xen is used more and more frequently. Xsm (Xen Security Module) , as the security framework of the Xen, has also been widespread concern. There are a lot of research to verify the system operations correctness by formal method. The existing formalization research is mainly concerned with the code correctness of the system implementation. Thus, the system is modeled formally which subject behavior is taken as operating system semantic model in the perspective of system function, and the security requirements of XMS is analyzed by adopting the CLT sequential logic. As the connection of the rationality of system design and formal verification, the semantic model is responsible for the formal verification of the XSM, and the Isabelle/HOL is utilized to verify the consistency between functions and security requirements so as to demonstrate whether the XSM meets the security re-quirements.
出处 《计算机应用与软件》 2017年第6期314-321,共8页 Computer Applications and Software
基金 国家高技术研究发展计划项目(2012AA012704)
关键词 XSM 语义模型 形式化验证 安全性分析 Isabelle/HOL XSM Semantic model Formal verification Security analysis Isabelle/HOL
  • 相关文献

参考文献3

二级参考文献36

  • 1陈伟,薛云志,赵琛,李明树.一种基于时间自动机的实时系统测试方法[J].软件学报,2007,18(1):62-73. 被引量:14
  • 2周巢尘.形式语义学引论[M].长沙:湖南科学技术出版社,1985.
  • 3Clarke E, Grumberg O, Peled D. Model checking [ M ]. The MIT Press, 2000.
  • 4Alur R, Dill D. A theory of timed automata[ J]. Theoretical Computer Science, 1994,126 (2) : 183 - 235.
  • 5Safra S. On the Comlexity of co automata [ C]//Proceedings of 29^th Foundations of Computer Science,1988. IEEE.
  • 6Larsen K, Petterson P, Wang Y. UPPAAL in a Nutshell[J]. International Journal on Software Tools for Technology Transfer (SITT), 1997,1 (1) :134-152.
  • 7Latella D, Majzik I, Massink M. Towards a Formal Operational Semantics of UML Statechart Diagrams [ C ]//Porceedings of the Formal Methods for Open Object-Based Distributed Systems, 1999.
  • 8Mallet F, De Simone R. MARTE : A Profile for RT/E systems modeling, analYsis and simulation? [C]//Proceedings of the 1^st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems,2008:43.
  • 9David A, Mailer M, Oiler M. From HUPPAAL to UPPAAL-A Translation from Hierarchical Timed Automata to Flat Timed Automata [ R ]. Technical Report. Department of Computer Science, University of Aarhus, March, 2001.
  • 10Abadi M,Budiu M, Erlingsson U,et al. Control-flowintegrity principles, implementations, and applications [J].ACM Trans on Information and System Security, 2009,13(1): 1-40.

共引文献11

同被引文献15

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部