Skip to main content

Tipp

Weitere Artikel dieser Ausgabe durch Wischen aufrufen

Erschienen in: Journal of Automated Reasoning 4/2021

27.07.2020

Automated Proof of Bell–LaPadula Security Properties

verfasst von: Maximiliano Cristiá, Gianfranco Rossi

Erschienen in: Journal of Automated Reasoning | Ausgabe 4/2021

Einloggen, um Zugang zu erhalten
share
TEILEN

Abstract

Almost 50 years ago, D. E. Bell and L. LaPadula published the first formal model of a secure system, known today as the Bell–LaPadula (BLP) model. BLP is described as a state machine by means of first-order logic and set theory. The authors also formalize two state invariants known as security condition and *-property. Bell and LaPadula prove that all the state transitions preserve these invariants. In this paper we present a fully automated proof of the security condition and the *-property for all the model operations. The model and the proofs are coded in the \(\{log\}\) tool. As far as we know this is the first time such proofs are automated. Besides, we show that the \(\{log\}\) model is also an executable prototype. Therefore we are providing an automatically verified executable prototype of BLP.

Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 69.000 Bücher
  • über 500 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt 90 Tage mit der neuen Mini-Lizenz testen!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 58.000 Bücher
  • über 300 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko





Jetzt 90 Tage mit der neuen Mini-Lizenz testen!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 50.000 Bücher
  • über 380 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe



 


Jetzt 90 Tage mit der neuen Mini-Lizenz testen!

Fußnoten
1
This number is obtained on a Latitude E7470 (06DC) with a 4 core Intel(R) Core™ i7-6600U CPU at 2.60GHz with 8 Gb of main memory. The software components are the following: Linux Ubuntu 18.04.3 (LTS) 64-bit with kernel 4.15.0-70-generic, and \(\{log\}\) 4.9.6-18b over SWI-Prolog (multi-threaded, 64 bits, version 7.6.4).
 
Literatur
1.
Zurück zum Zitat Abrial, J.R.: The B-Book: Assigning Programs to Meanings. Cambridge University Press, New York (1996) CrossRef Abrial, J.R.: The B-Book: Assigning Programs to Meanings. Cambridge University Press, New York (1996) CrossRef
6.
Zurück zum Zitat Bell, D.E., LaPadula, L.: Secure Computer Systems: Mathematical Foundations. MTR 2547, The MITRE Corporation, McLean (1973) Bell, D.E., LaPadula, L.: Secure Computer Systems: Mathematical Foundations. MTR 2547, The MITRE Corporation, McLean (1973)
7.
Zurück zum Zitat Bell, D.E., LaPadula, L.: Secure Computer Systems: Mathematical Model. ESD-TR 73-278, The MITRE Corporation, McLean (1973) Bell, D.E., LaPadula, L.: Secure Computer Systems: Mathematical Model. ESD-TR 73-278, The MITRE Corporation, McLean (1973)
8.
Zurück zum Zitat Bonichon, R., Delahaye, D., Doligez, D.: Zenon: an extensible automated theorem prover producing checkable proofs. In: Dershowitz, N., Voronkov, A. (eds.) 14th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning, LPAR 2007, Yerevan, Armenia, October 15–19, 2007, Proceedings. Lecture Notes in Computer Science, vol. 4790, pp. 151–165. Springer (2007). https://​doi.​org/​10.​1007/​978-3-540-75560-9_​13 Bonichon, R., Delahaye, D., Doligez, D.: Zenon: an extensible automated theorem prover producing checkable proofs. In: Dershowitz, N., Voronkov, A. (eds.) 14th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning, LPAR 2007, Yerevan, Armenia, October 15–19, 2007, Proceedings. Lecture Notes in Computer Science, vol. 4790, pp. 151–165. Springer (2007). https://​doi.​org/​10.​1007/​978-3-540-75560-9_​13
9.
Zurück zum Zitat Coq Development Team: The Coq Proof Assistant Reference Manual, Version 8.8.1. LogiCal Project, Palaiseau, France (2018) Coq Development Team: The Coq Proof Assistant Reference Manual, Version 8.8.1. LogiCal Project, Palaiseau, France (2018)
10.
Zurück zum Zitat Cristiá, M.: Formal verification of an extension of a secure, compatible UNIX file system. In: Anales de la XXIX Conferencia Latinoamericana de Informática. CLEI, La Paz, Bolivia (2003) Cristiá, M.: Formal verification of an extension of a secure, compatible UNIX file system. In: Anales de la XXIX Conferencia Latinoamericana de Informática. CLEI, La Paz, Bolivia (2003)
11.
Zurück zum Zitat Cristiá, M., Rossi, G.: A decision procedure for restricted intensional sets. In: de Moura, L. (ed.) Automated Deduction—CADE 26—26th International Conference on Automated Deduction, Gothenburg, Sweden, August 6–11, 2017, Proceedings. Lecture Notes in Computer Science, vol. 10395, pp. 185–201. Springer (2017). https://​doi.​org/​10.​1007/​978-3-319-63046-5_​12 Cristiá, M., Rossi, G.: A decision procedure for restricted intensional sets. In: de Moura, L. (ed.) Automated Deduction—CADE 26—26th International Conference on Automated Deduction, Gothenburg, Sweden, August 6–11, 2017, Proceedings. Lecture Notes in Computer Science, vol. 10395, pp. 185–201. Springer (2017). https://​doi.​org/​10.​1007/​978-3-319-63046-5_​12
12.
Zurück zum Zitat Cristiá, M., Rossi, G.: A set solver for finite set relation algebra. In: Desharnais, J., Guttmann, W., Joosten, S. (eds.) Relational and Algebraic Methods in Computer Science—17th International Conference, RAMiCS 2018, Groningen, The Netherlands, October 29–November 1, 2018, Proceedings. Lecture Notes in Computer Science, vol. 11194, pp. 333–349. Springer (2018). https://​doi.​org/​10.​1007/​978-3-030-02149-8_​20 Cristiá, M., Rossi, G.: A set solver for finite set relation algebra. In: Desharnais, J., Guttmann, W., Joosten, S. (eds.) Relational and Algebraic Methods in Computer Science—17th International Conference, RAMiCS 2018, Groningen, The Netherlands, October 29–November 1, 2018, Proceedings. Lecture Notes in Computer Science, vol. 11194, pp. 333–349. Springer (2018). https://​doi.​org/​10.​1007/​978-3-030-02149-8_​20
15.
Zurück zum Zitat Cristiá, M., Rossi, G., Frydman, C.S.: log as a test case generator for the Test Template Framework. In: Hierons, R.M., Merayo, M.G., Bravetti, M. (eds.) SEFM. Lecture Notes in Computer Science, vol. 8137, pp. 229–243. Springer, Berlin (2013) Cristiá, M., Rossi, G., Frydman, C.S.: log as a test case generator for the Test Template Framework. In: Hierons, R.M., Merayo, M.G., Bravetti, M. (eds.) SEFM. Lecture Notes in Computer Science, vol. 8137, pp. 229–243. Springer, Berlin (2013)
16.
Zurück zum Zitat Dénès, M., Hritcu, C., Lampropoulos, L., Paraskevopoulou, Z., Pierce, B.C.: Quickchick: property-based testing for Coq. In: The Coq Workshop (2014) Dénès, M., Hritcu, C., Lampropoulos, L., Paraskevopoulou, Z., Pierce, B.C.: Quickchick: property-based testing for Coq. In: The Coq Workshop (2014)
17.
Zurück zum Zitat Devyanin, P.N., Khoroshilov, A.V., Kuliamin, V.V., Petrenko, A.K., Shchepetkov, I.V.: Formal verification of OS security model with alloy and event-b. In: Ameur, Y.A., Schewe, K. (eds.) Abstract State Machines, Alloy, B, TLA, VDM, and Z—4th International Conference, ABZ 2014, Toulouse, France, June 2–6, 2014. Proceedings. Lecture Notes in Computer Science, vol. 8477, pp. 309–313. Springer (2014). https://​doi.​org/​10.​1007/​978-3-662-43652-3_​30 Devyanin, P.N., Khoroshilov, A.V., Kuliamin, V.V., Petrenko, A.K., Shchepetkov, I.V.: Formal verification of OS security model with alloy and event-b. In: Ameur, Y.A., Schewe, K. (eds.) Abstract State Machines, Alloy, B, TLA, VDM, and Z—4th International Conference, ABZ 2014, Toulouse, France, June 2–6, 2014. Proceedings. Lecture Notes in Computer Science, vol. 8477, pp. 309–313. Springer (2014). https://​doi.​org/​10.​1007/​978-3-662-43652-3_​30
18.
Zurück zum Zitat Doligez, D., Jaume, M., Rioboo, R.: Development of secured systems by mixing programs, specifications and proofs in an object-oriented programming environment: a case study within the focalize environment. In: Maffeis, S., Rezk, T. (eds.) Proceedings of the 2012 Workshop on Programming Languages and Analysis for Security, PLAS 2012, Beijing, China, 15 June, 2012, p. 9. ACM (2012). https://​doi.​org/​10.​1145/​2336717.​2336726 Doligez, D., Jaume, M., Rioboo, R.: Development of secured systems by mixing programs, specifications and proofs in an object-oriented programming environment: a case study within the focalize environment. In: Maffeis, S., Rezk, T. (eds.) Proceedings of the 2012 Workshop on Programming Languages and Analysis for Security, PLAS 2012, Beijing, China, 15 June, 2012, p. 9. ACM (2012). https://​doi.​org/​10.​1145/​2336717.​2336726
19.
Zurück zum Zitat Dovier, A., Piazza, C., Pontelli, E., Rossi, G.: Sets and constraint logic programming. ACM Trans. Program. Lang. Syst. 22(5), 861–931 (2000) CrossRef Dovier, A., Piazza, C., Pontelli, E., Rossi, G.: Sets and constraint logic programming. ACM Trans. Program. Lang. Syst. 22(5), 861–931 (2000) CrossRef
21.
Zurück zum Zitat Gasser, M.: Building a Secure Computer System. Van Nostrand Reinhold Co., New York (1988) Gasser, M.: Building a Secure Computer System. Van Nostrand Reinhold Co., New York (1988)
27.
Zurück zum Zitat Murray, T.C., Matichuk, D., Brassil, M., Gammie, P., Bourke, T., Seefried, S., Lewis, C., Gao, X., Klein, G.: sel4: From general purpose to a proof of information flow enforcement. In: 2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, USA, May 19–22, 2013, pp. 415–429. IEEE Computer Society (2013). https://​doi.​org/​10.​1109/​SP.​2013.​35 Murray, T.C., Matichuk, D., Brassil, M., Gammie, P., Bourke, T., Seefried, S., Lewis, C., Gao, X., Klein, G.: sel4: From general purpose to a proof of information flow enforcement. In: 2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, USA, May 19–22, 2013, pp. 415–429. IEEE Computer Society (2013). https://​doi.​org/​10.​1109/​SP.​2013.​35
32.
Zurück zum Zitat Spivey, J.M.: The Z Notation: A Reference Manual. Prentice Hall International (UK) Ltd., Hertfordshire (1992) MATH Spivey, J.M.: The Z Notation: A Reference Manual. Prentice Hall International (UK) Ltd., Hertfordshire (1992) MATH
33.
Zurück zum Zitat Stasiak, A., Zielinski, Z.: An approach to automated verification of multi-level security system models. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds.) New Results in Dependability and Computer Systems—Proceedings of the 8th International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, September 9–13, 2013, Brunów, Poland. Advances in Intelligent Systems and Computing, vol. 224, pp. 375–388. Springer (2013). https://​doi.​org/​10.​1007/​978-3-319-00945-2_​34 Stasiak, A., Zielinski, Z.: An approach to automated verification of multi-level security system models. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds.) New Results in Dependability and Computer Systems—Proceedings of the 8th International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, September 9–13, 2013, Brunów, Poland. Advances in Intelligent Systems and Computing, vol. 224, pp. 375–388. Springer (2013). https://​doi.​org/​10.​1007/​978-3-319-00945-2_​34
34.
Zurück zum Zitat von Oheimb, D.: Information flow control revisited: Noninfluence = noninterference + nonleakage. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) 9th European Symposium on Research Computer Security—ESORICS 2004, Sophia Antipolis, France, September 13–15, 2004, Proceedings. Lecture Notes in Computer Science, vol. 3193, pp. 225–243. Springer (2004). https://​doi.​org/​10.​1007/​978-3-540-30108-0_​14 von Oheimb, D.: Information flow control revisited: Noninfluence = noninterference + nonleakage. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) 9th European Symposium on Research Computer Security—ESORICS 2004, Sophia Antipolis, France, September 13–15, 2004, Proceedings. Lecture Notes in Computer Science, vol. 3193, pp. 225–243. Springer (2004). https://​doi.​org/​10.​1007/​978-3-540-30108-0_​14
Metadaten
Titel
Automated Proof of Bell–LaPadula Security Properties
verfasst von
Maximiliano Cristiá
Gianfranco Rossi
Publikationsdatum
27.07.2020
Verlag
Springer Netherlands
Erschienen in
Journal of Automated Reasoning / Ausgabe 4/2021
Print ISSN: 0168-7433
Elektronische ISSN: 1573-0670
DOI
https://doi.org/10.1007/s10817-020-09577-6

Premium Partner