Application of verification techniques to security: model checking insider attacks
Kammueller, Florian and Probst, Christian and Raimondi, Franco (2012) Application of verification techniques to security: model checking insider attacks. In: 1st International Conference on Software and Emerging Technologies for Education, Culture, Entertainment, and Commerce (SETECEC 2012): New Directions in Multimedia Mobile Computing, Social Networks, Human-Computer Interaction and Communicability, 28-29 Mar 2012, Venice, Italy.
Full text is not in this repository.
Official URL: http://www.alaipo.com/setecec/conference_setecec_2...
In this paper, we give a short overview over the state of the art of formal verification techniques to the engineering of safe and secure systems. The main focus is on the support of security of real-world systems with mechanized verification techniques, in particular, model checking. Based on our prior experience with safety analysis – in particular the TWIN elevator (ThyssenKrupp) case study – the current case study ventures into the rising field of of social engineering attacks on security. This main focus and original contribution of this paper considers the security analysis of an insider attack illustrating the benefits of model checking with belief logics and actor system modeling.
|Item Type:||Conference or Workshop Item (Paper)|
|Research Areas:||A. > School of Science and Technology > Computer Science > Artificial Intelligence group|
A. > School of Science and Technology > Computer Science > Foundations of Computing group
A. > School of Science and Technology > Computer Science > Intelligent Environments group
A. > School of Science and Technology > Computer Science > SensoLab group
|Deposited On:||25 May 2012 10:30|
|Last Modified:||24 Mar 2015 12:19|
Repository staff only: item control page
Full text downloads (NB count will be zero if no full text documents are attached to the record)
Downloads per month over the past year