skip to main content
10.1145/3133956.3134080acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Verifying Security Policies in Multi-agent Workflows with Loops

Published:30 October 2017Publication History

ABSTRACT

We consider the automatic verification of information flow security policies of web-based workflows, such as conference submission systems like EasyChair. Our workflow description language allows for loops, non-deterministic choice, and an unbounded number of participating agents. The information flow policies are specified in a temporal logic for hyperproperties. We show that the verification problem can be reduced to the satisfiability of a formula of first-order linear-time temporal logic, and provide decidability results for relevant classes of workflows and specifications. We report on experimental results obtained with an implementation of our approach on a series of benchmarks.

Skip Supplemental Material Section

Supplemental Material

References

  1. Aharon Abadi, Alexander Rabinovich, and Mooly Sagiv. 2010. Decidable fragments of many-sorted logic. Journal of Symbolic Computation 45, 2 (2010), 153-- 172. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Myrto Arapinis, Sergiu Bursuc, and Mark Ryan. 2012. Privacy Supporting Cloud Computing: ConfiChair, a Case Study. In Proc. POST 2012. Springer Verlag, 89-- 108. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Thomas Ball, Nikolaj Bjørner, Aaron Gember, Shachar Itzhaky, Aleksandr Karbyshev, Mooly Sagiv, Michael Schapira, and Asaf Valadarsky. 2014. VeriCon: towards verifying controller programs in software-defined networks. In Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2014). ACM, 282--293. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Thomas Bauereiß and Dieter Hutter. 2014. Information flow control for workflow management systems. it - Information Technology 56, 6 (2014), 294--299.Google ScholarGoogle Scholar
  5. Thomas Bauereiß, Armando Pesenti Gritti, Andrei Popescu, and Franco Raimondi. 2017. CoSMeDis: A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees. (2017). to appear in Security and Privacy 2017.Google ScholarGoogle Scholar
  6. Robert Berger. 1966. The undecidability of the domino problem. Number 66. American Mathematical Soc.Google ScholarGoogle Scholar
  7. C. Bhardwaj and S. Prasad. 2015. Parametric information flow control in ehealth. In Proceedings HealthCom 2015. 102--107. https://doi.org/10.1109/HealthCom. 2015.7454481Google ScholarGoogle Scholar
  8. Egon Börger, Erich Grädel, and Yuri Gurevich. 1997. The Classical Decision Problem. Springer. Google ScholarGoogle ScholarCross RefCross Ref
  9. Michael R Clarkson, Bernd Finkbeiner, Masoud Koleini, Kristopher K Micinski, Markus N Rabe, and César Sánchez. 2014. Temporal logics for hyperproperties. In International Conference on Principles of Security and Trust. Springer, 265--284.Google ScholarGoogle ScholarCross RefCross Ref
  10. Michael R. Clarkson and Fred B. Schneider. 2010. Hyperproperties. Journal of Computer Security 18, 6 (2010), 1157--1210. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Leonardo De Moura and Nikolaj Bjørner. 2008. Z3: An efficient SMT solver. In International conference on Tools and Algorithms for the Construction and Analysis of Systems. Springer, 337--340.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Remco M Dijkman, Marlon Dumas, and Chun Ouyang. 2008. Semantics and analysis of business process models in BPMN. Information and Software technology 50, 12 (2008), 1281--1294.Google ScholarGoogle Scholar
  13. R. Dimitrova, B. Finkbeiner, M. Kovács, M. N. Rabe, and H. Seidl. 2012. Model Checking Information Flow in Reactive Systems. In Proc. VMCAI'12. 169--185. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. R. Fagin, J. Y. Halpern, Y. Moses, and M. Y. Vardi. 1995. Reasoning About Knowledge. MIT Press.Google ScholarGoogle Scholar
  15. Bernd Finkbeiner and Christopher Hahn. 2016. Deciding Hyperproperties. In 27th International Conference on Concurrency Theory (CONCUR 2016) (Leibniz International Proceedings in Informatics (LIPIcs)), Josée Desharnais and Radha Jagadeesan (Eds.), Vol. 59. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany, 13:1--13:14.Google ScholarGoogle Scholar
  16. Bernd Finkbeiner, Helmut Seidl, and Christian Müller. 2016. Specifying and Verifying Secrecy in Workflows with Arbitrarily Many Agents. In Proceedings of the 14th International Symposium on Automated Technology for Verification and Analysis (ATVA 2016) (Lecture Notes in Computer Science), Vol. 9938. 157--173. Google ScholarGoogle ScholarCross RefCross Ref
  17. J. A. Goguen and J. Meseguer. 1982. Security Policies and Security Models. In Proceedings of the IEEE Symposium on Security and Privacy. 11--20. Google ScholarGoogle ScholarCross RefCross Ref
  18. Ian M. Hodkinson, Frank Wolter, and Michael Zakharyaschev. 2000. Decidable fragment of first-order temporal logics. Ann. Pure Appl. Logic 106, 1--3 (2000), 85--134.Google ScholarGoogle ScholarCross RefCross Ref
  19. Daniel Jackson. 2012. Software Abstractions: logic, language, and analysis. MIT press.Google ScholarGoogle Scholar
  20. Emmanuel Jeandel. 2010. The periodic domino problem revisited. Theoretical Computer Science 411, 44--46 (2010), 4010--4016.Google ScholarGoogle ScholarCross RefCross Ref
  21. Sudeep Kanav, Peter Lammich, and Andrei Popescu. 2014. A Conference Management System with Verified Document Confidentiality. In Proceedings of the 26th International Conference on Computer Aided Verification (CAV 2014). Springer Verlag, 167--183.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Denis Kuperberg, Julien Brunel, and David Chemouil. 2016. On Finite Domains in First-Order Linear Temporal Logic. In International Symposium on Automated Technology for Verification and Analysis. Springer, 211--226. Google ScholarGoogle ScholarCross RefCross Ref
  23. Jianwen Li, Yinbo Yao, Geguang Pu, Lijun Zhang, and Jifeng He. 2014. Aalta: An LTL Satisfiability Checker over Infinite/Finite Traces. In Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering (FSE 2014). ACM, 731--734. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Nuno Macedo, Julien Brunel, David Chemouil, Alcino Cunha, and Denis Kuperberg. 2016. Lightweight specification and analysis of dynamic systems with rich configurations. In Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering (FSE 2016). ACM, 373--383. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Zohar Manna and Amir Pnueli. 1981. Verification of Concurrent Programs: The Temporal Framework. In The Correctness Problem in Computer Science, Robert S. Boyer and J Strother Moore (Eds.). Academic Press, London, 215--273.Google ScholarGoogle Scholar
  26. Heiko Mantel. 2000. Possibilistic Definitions of Security -- An Assembly Kit. In Proceedings of the 13th IEEE Computer Security Foundations Workshop (CSFW). IEEE Computer Society, 185--199. Google ScholarGoogle ScholarCross RefCross Ref
  27. Timothy Nelson, Daniel J. Dougherty, Kathi Fisler, and Shriram Krishnamurthi. 2012. Toward a More Complete Alloy. In Proceedings of the 3rd International Conference on Abstract State Machines, Alloy, B, VDM, and Z (ABZ 2012) (Lecture Notes in Computer Science), Vol. 7316. Springer, 136--149. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. A. Sabelfeld and D. Sands. 2005. Dimensions and Principles of Declassification. In Proceedings CSFW'05. IEEE Computer Society, 255--269. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. A. P. Sistla and E. M. Clarke. 1985. The Complexity of Propositional Linear Temporal Logics. J. ACM 32, 3 (July 1985), 733--749. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. David Sutherland. 1986. A model of information. In Proc. 9th National Computer Security Conference. DTIC Document, 175--183.Google ScholarGoogle Scholar
  31. Hao Wang. 1990. Dominoes and the AEA case of the decision problem. In Computation, Logic, Philosophy. Springer, 218--245. Google ScholarGoogle ScholarCross RefCross Ref
  32. Christoph Weidenbach, Dilyana Dimova, Arnaud Fietzke, Rohit Kumar, Martin Suda, and Patrick Wischnewski. 2009. SPASS Version 3.5. In International Conference on Automated Deduction. Springer, 140--145. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. S. Zdancewic and A. C. Myers. 2003. Observational Determinism for Concurrent Program Security. In Proceedings of CSFW'03. Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Verifying Security Policies in Multi-agent Workflows with Loops

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
        October 2017
        2682 pages
        ISBN:9781450349468
        DOI:10.1145/3133956

        Copyright © 2017 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 30 October 2017

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        CCS '17 Paper Acceptance Rate151of836submissions,18%Overall Acceptance Rate1,261of6,999submissions,18%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader