Systematic classification of attackers via bounded model checking
In this work, we study the problem of verification of systems in the presence of attackers using bounded model checking. Given a system and a set of security requirements, we present a methodology to generate and classify attackers, mapping them to the set of requirements that they can break. A naiv...
Saved in:
Main Authors: | , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2020
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/4634 https://ink.library.smu.edu.sg/context/sis_research/article/5637/viewcontent/1911.05808.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-5637 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-56372020-03-17T10:02:56Z Systematic classification of attackers via bounded model checking ROTHSTEIN-MORRIS, Eric SUN, Jun CHATTOPADYAY, Sudipta In this work, we study the problem of verification of systems in the presence of attackers using bounded model checking. Given a system and a set of security requirements, we present a methodology to generate and classify attackers, mapping them to the set of requirements that they can break. A naive approach suffers from the same shortcomings of any large model checking problem, i.e., memory shortage and exponential time. To cope with these shortcomings, we describe two sound heuristics based on cone-of-influence reduction and on learning, which we demonstrate empirically by applying our methodology to a set of hardware benchmark systems. 2020-01-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/4634 info:doi/10.1007/978-3-030-39322-9_11 https://ink.library.smu.edu.sg/context/sis_research/article/5637/viewcontent/1911.05808.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Information Security |
spellingShingle |
Information Security ROTHSTEIN-MORRIS, Eric SUN, Jun CHATTOPADYAY, Sudipta Systematic classification of attackers via bounded model checking |
description |
In this work, we study the problem of verification of systems in the presence of attackers using bounded model checking. Given a system and a set of security requirements, we present a methodology to generate and classify attackers, mapping them to the set of requirements that they can break. A naive approach suffers from the same shortcomings of any large model checking problem, i.e., memory shortage and exponential time. To cope with these shortcomings, we describe two sound heuristics based on cone-of-influence reduction and on learning, which we demonstrate empirically by applying our methodology to a set of hardware benchmark systems. |
format |
text |
author |
ROTHSTEIN-MORRIS, Eric SUN, Jun CHATTOPADYAY, Sudipta |
author_facet |
ROTHSTEIN-MORRIS, Eric SUN, Jun CHATTOPADYAY, Sudipta |
author_sort |
ROTHSTEIN-MORRIS, Eric |
title |
Systematic classification of attackers via bounded model checking |
title_short |
Systematic classification of attackers via bounded model checking |
title_full |
Systematic classification of attackers via bounded model checking |
title_fullStr |
Systematic classification of attackers via bounded model checking |
title_full_unstemmed |
Systematic classification of attackers via bounded model checking |
title_sort |
systematic classification of attackers via bounded model checking |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2020 |
url |
https://ink.library.smu.edu.sg/sis_research/4634 https://ink.library.smu.edu.sg/context/sis_research/article/5637/viewcontent/1911.05808.pdf |
_version_ |
1770574933440593920 |