Back to Search Start Over

OACAL: Finding Module-consistent Specifications to Secure Systems from Weakened User Obligations

Authors :
Jiang, Pengcheng
Tei, Kenji
Source :
2021 IEEE Symposium Series on Computational Intelligence (SSCI).
Publication Year :
2021
Publisher :
IEEE, 2021.

Abstract

Users interacting with a system through UI are typically obliged to perform their actions in a pre-determined order, to successfully achieve certain functional goals. However, such obligations are often not followed strictly by users, which may lead to the violation to security properties, especially in security-critical systems. To improve the security with the awareness of unexpected user behaviors, a system can be redesigned to a more robust one by changing the order of actions in its specification. Meanwhile, we anticipate that the functionalities would remain consistent following the modifications. In this paper, we propose an efficient algorithm to automatically produce specification revisions tackling the attack scenarios caused by weakened user obligations. By our algorithm, all the revisions would be generated to maintain the integrity of the functionalities using a novel recomposition approach. Then, the eligible revisions that can satisfy the security requirements would be efficiently spotted by a hybrid approach combining model checking and machine learning techniques. We evaluate our algorithm by comparing its performance with a state-of-the-art approach regarding their coverage and searching speed of the desirable revisions.<br />Comment: 9 pages, 15 figures, 3 tables. This paper has been accepted for presentation at the 2021 IEEE Symposium Series on Computational Intelligence (SSCI) (SSCI 2021) and for publication in the conference proceedings published by IEEE

Details

Database :
OpenAIRE
Journal :
2021 IEEE Symposium Series on Computational Intelligence (SSCI)
Accession number :
edsair.doi.dedup.....6c55fa344c15a1c5b8dba1acc010d31c
Full Text :
https://doi.org/10.1109/ssci50451.2021.9660106