Threat Repair with Optimization Modulo Theories

10/06/2022
by   Thorsten Tarrach, et al.
0

We propose a model-based procedure for automatically preventing security threats using formal models. We encode system models and potential threats as satisfiability modulo theory (SMT) formulas. This model allows us to ask security questions as satisfiability queries. We formulate threat prevention as an optimization problem over the same formulas. The outcome of our threat prevention procedure is a suggestion of model attribute repair that eliminates threats. Whenever threat prevention fails, we automatically explain why the threat happens. We implement our approach using the state-of-the-art Z3 SMT solver and interface it with the threat analysis tool THREATGET. We demonstrate the value of our procedure in two case studies from automotive and smart home domains, including an industrial-strength example.

READ FULL TEXT
research
09/15/2023

Satisfiability.jl: Satisfiability Modulo Theories in Julia

Satisfiability modulo theories (SMT) is a core tool in formal verificati...
research
08/31/2020

Incomplete SMT Techniques for Solving Non-Linear Formulas over the Integers

We present new methods for solving the Satisfiability Modulo Theories pr...
research
09/07/2021

First-Order Logic in Finite Domains: Where Semantic Evaluation Competes with SMT Solving

In this paper, we compare two alternative mechanisms for deciding the va...
research
10/08/2019

Finding Security Threats That Matter: An Industrial Case Study

Recent trends in the software engineering (i.e., Agile, DevOps) have sho...
research
12/06/2018

Trustworthy Smart Band: Security Requirement Analysis with Threat Modeling

As smart bands make life more convenient and provide a positive lifestyl...
research
11/15/2019

Integrating Threat Modeling and Automated Test Case Generation into Industrialized Software Security Testing

Industrial Internet of Things (IIoT) application provide a whole new set...
research
02/02/2018

Detecting Zones and Threat on 3D Body for Security in Airports using Deep Machine Learning

In this research, it was used a segmentation and classification method t...

Please sign up or login with your details

Forgot password? Click here to reset