Application of verification techniques to security: model checking insider attacks
Kammueller, Florian and Probst, Christian and Raimondi, Franco (2012) Application of verification techniques to security: model checking insider attacks. In: 1st International Conference on Software and Emerging Technologies for Education, Culture, Entertainment, and Commerce (SETECEC 2012): New Directions in Multimedia Mobile Computing, Social Networks, Human-Computer Interaction and Communicability, 28-29 March 2012, Venice, Italy. (Unpublished)
Full text is not in this repository.
Official URL: http://www.alaipo.com/setecec/conference_setecec_2...
In this paper, we give a short overview over the state of the art of formal verification techniques to the engineering of safe and secure systems. The main focus is on the support of security of real-world systems with mechanized verification techniques, in particular, model checking. Based on our prior experience with safety analysis – in particular the TWIN elevator (ThyssenKrupp) case study – the current case study ventures into the rising field of of social engineering attacks on security. This main focus and original contribution of this paper considers the security analysis of an insider attack illustrating the benefits of model checking with belief logics and actor system modeling.
|Item Type:||Conference or Workshop Item (Paper)|
|Research Areas:||Middlesex University Schools and Centres > School of Science and Technology > Computer Science|
Middlesex University Schools and Centres > School of Science and Technology > Computer Science > Foundations of Computing group
Middlesex University Schools and Centres > School of Science and Technology > Computer Science > Artificial Intelligence group
|Deposited On:||25 May 2012 10:30|
|Last Modified:||28 Oct 2014 17:58|
Repository staff only: item control page
Full text downloads (NB count will be zero if no full text documents are attached to the record)
Downloads per month over the past year