Automated Learning and Verification of Embedded Security Architectures
Techniques to verify or invalidate the security of computer systems have come a long way in recent years. While sophisticated tools are available to specify and formally verify the behavior of a system, attack techniques have evolved to the point of questioning the possibility of obtaining adequate levels of security, especially in critical applications. In a recent paper, Bognar et al. have clearly highlighted this inconsistency between the two worlds: on one side, formal verification allows writing irrefutable proofs of the security of a system, on the other side, concrete attacks make these proofs waver, exhibiting a gap between models and implementations which is very complex to bridge. In this extended abstract, we outline a new general methodology based on robust non-interference preservation that reduces this gap by bringing together some peculiarities of the two approaches. Our methodology uses automata learning to extract behavioral models of real systems, and model checking to analyze them and identify attacks or anomalies.
Extended abstract (bfl_prisc23.pdf) | 481KiB |
Sat 21 JanDisplayed time zone: Eastern Time (US & Canada) change
11:00 - 12:30 | |||
11:00 25mTalk | Automated Learning and Verification of Embedded Security Architectures PriSC Matteo Busi University Ca' Foscari, Venice, Riccardo Focardi University Ca' Foscari, Venice, Flaminia L. Luccio University Ca' Foscari, Venice File Attached | ||
11:25 25mTalk | pi_RA: A pi-calculus for verifying protocols that use remote attestation PriSC File Attached | ||
11:50 25mTalk | Robust Constant-Time Cryptography PriSC Matthew Kolosick University of California at San Diego, Basavesh Ammanaghatta Shivakumar Max Planck Institute for Security and Privacy (MPI-SP), Sunjay Cauligi University of California at San Diego, USA, Marco Patrignani University of Trento, Marco Vassena Utrecht University, Ranjit Jhala University of California at San Diego, Deian Stefan University of California at San Diego Pre-print | ||
12:15 15mTalk | Short Talk: Generalising secure compilation criteria PriSC Emiel Lanckriet KU Leuven |