Systematic Classification of Attackers via Bounded Model Checking

11/13/2019
by   Eric Rothstein-Morris, et al.
0

In this work, we study the problem of verification of systems in the presence of attackers using bounded model checking. Given a system and a set of security requirements, we present a methodology to generate and classify attackers, mapping them to the set of requirements that they can break. A naive approach suffers from the same shortcomings of any large model checking problem, i.e., memory shortage and exponential time. To cope with these shortcomings, we describe two sound heuristics based on cone-of-influence reduction and on learning, which we demonstrate empirically by applying our methodology to a set of hardware benchmark systems.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/16/2018

Quantifying Attacker Capability Via Model Checking Multiple Properties (Extended Version)

This work aims to solve a practical problem, i.e., how to quantify the r...
research
07/25/2018

Model Checking Quantum Systems --- A Survey

This article discusses the essential difficulties in developing model-ch...
research
07/25/2021

Model Checking Algorithms for Hyperproperties

Hyperproperties generalize trace properties by expressing relations betw...
research
10/20/2019

MSO-Definable Regular Model Checking

Regular Model Checking (RMC) is a symbolic model checking technique wher...
research
05/18/2023

Lightweight Online Learning for Sets of Related Problems in Automated Reasoning

We present Self-Driven Strategy Learning (sdsl), a lightweight online le...
research
09/18/2020

Bounded Model Checking for Hyperproperties

This paper introduces the first bounded model checking (BMC) algorithm f...
research
01/22/2023

LF-checker: Machine Learning Acceleration of Bounded Model Checking for Concurrency Verification (Competition Contribution)

We describe and evaluate LF-checker, a metaverifier tool based on machin...

Please sign up or login with your details

Forgot password? Click here to reset