A Formal Development Cycle for Security Engineering in Isabelle

01/04/2020
by   Florian Kammüller, et al.
0

In this paper, we show a security engineering process based on a formal notion of refinement fully formalized in the proof assistant Isabelle. This Refinement-Risk Cycle focuses on attack analysis and security refinement supported by interactive theorem proving. Since we use a fully formalized model of infrastructures with actors and policies we can support a novel way of formal security refinement for system specifications. This formal process is built practically as an extension to the Isabelle Infrastructure framework with attack trees. We define a formal notion of refinement on infrastructure models. Thanks to the formal foundation of Kripke structures and branching time temporal logic in the Isabelle Infrastructure framework, these stepwise transformations can be interleaved with attack tree analysis thus providing a fully formal security engineering framework. The process is illustrated on an IoT healthcare case study introducing GDPR requirements and blockchain.

READ FULL TEXT
research
12/08/2021

Dependability Engineering in Isabelle

In this paper, we introduce a process of formal system development suppo...
research
12/29/2021

Explanation by Automated Reasoning Using the Isabelle Infrastructure Framework

In this paper, we propose the use of interactive theorem proving for exp...
research
05/16/2019

Making Agile Development Processes fit for V-style Certification Procedures

We present a process for the development of safety and security critical...
research
03/26/2020

Applying the Isabelle Insider Framework to Airplane Security

Avionics is one of the fields in which verification methods have been pi...
research
03/17/2018

Attack Trees in Isabelle

In this paper, we present a proof theory for attack trees. Attack trees ...
research
09/25/2020

Integration of Formal Proof into Unified Assurance Cases with Isabelle/SACM

Assurance cases are often required to certify critical systems. The use ...
research
10/18/2020

RBAC for Healthcare-Infrastructure and data storage

Role based Access control (RBAC) is the cornerstone of security for any ...

Please sign up or login with your details

Forgot password? Click here to reset