OACAL: Finding Module-consistent Specifications to Secure Systems from Weakened User Obligations

08/16/2021
by   Pengcheng Jiang, et al.
0

Users interacting with a system through UI are typically obliged to perform their actions in a pre-determined order, to successfully achieve certain functional goals. However, such obligations are often not followed strictly by users, which may lead to the violation to security properties, especially in security-critical systems. To improve the security with the awareness of unexpected user behaviors, a system can be redesigned to a more robust one by changing the order of actions in its specification. Meanwhile, we anticipate that the functionalities would remain consistent following the modifications. In this paper, we propose an efficient algorithm to automatically produce specification revisions tackling the attack scenarios caused by weakened user obligations. By our algorithm, all the revisions would be generated to maintain the integrity of the functionalities using a novel recomposition approach. Then, the eligible revisions that can satisfy the security requirements would be efficiently spotted by a hybrid approach combining model checking and machine learning techniques. We evaluate our algorithm by comparing its performance with a state-of-the-art approach regarding their coverage and searching speed of the desirable revisions.

READ FULL TEXT
research
08/20/2021

Mining Secure Behavior of Hardware Designs

Specification mining offers a solution by automating security specificat...
research
07/05/2023

Towards a Formal Verification of the Lightning Network with TLA+

Payment channel networks are an approach to improve the scalability of b...
research
01/06/2020

Runtime Verification of Linux Kernel Security Module

The Linux kernel is one of the most important Free/Libre Open Source Sof...
research
03/09/2023

ACoRe: Automated Goal-Conflict Resolution

System goals are the statements that, in the context of software require...
research
08/18/2021

Timed Automata Robustness Analysis via Model Checking

Timed automata (TA) have been widely adopted as a suitable formalism to ...
research
01/18/2013

Applying machine learning techniques to improve user acceptance on ubiquitous environement

Ubiquitous information access becomes more and more important nowadays a...
research
03/01/2021

validation method to improve behavioral flows on uml requirements analysis model by cross-checking with state transition model

We propose a method to evaluate and improve the validity of required spe...

Please sign up or login with your details

Forgot password? Click here to reset