Application of verification techniques to security: model checking insider attacks

Kammueller, Florian and Probst, Christian and Raimondi, Franco (2012) Application of verification techniques to security: model checking insider attacks. In: 1st International Conference on Software and Emerging Technologies for Education, Culture, Entertainment, and Commerce (SETECEC 2012): New Directions in Multimedia Mobile Computing, Social Networks, Human-Computer Interaction and Communicability, 28-29 Mar 2012, Venice, Italy.

Full text is not in this repository.

Abstract

In this paper, we give a short overview over the state of the art of formal verification techniques to the engineering of safe and secure systems. The main focus is on the support of security of real-world systems with mechanized verification techniques, in particular, model checking. Based on our prior experience with safety analysis – in particular the TWIN elevator (ThyssenKrupp) case study – the current case study ventures into the rising field of of social engineering attacks on security. This main focus and original contribution of this paper considers the security analysis of an insider attack illustrating the benefits of model checking with belief logics and actor system modeling.

Item Type: Conference or Workshop Item (Paper)
Research Areas: A. > School of Science and Technology > Computer Science > Artificial Intelligence group
A. > School of Science and Technology > Computer Science > Foundations of Computing group
A. > School of Science and Technology > Computer Science > Intelligent Environments Research Group
A. > School of Science and Technology > Computer Science > SensoLab group
Item ID: 9084
Useful Links:
Depositing User: Dr Florian Kammueller
Date Deposited: 25 May 2012 10:30
Last Modified: 13 Oct 2016 14:24
URI: http://eprints.mdx.ac.uk/id/eprint/9084

Actions (login required)

Edit Item Edit Item