Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
158 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Higher Order Model Checking in Isabelle for Human Centric Infrastructure Security (2312.17555v1)

Published 29 Dec 2023 in cs.LO

Abstract: In this paper we present an efficient approach to implementing model checking in the Higher Order Logic (HOL) of Isabelle. This is a non-trivial task since model checking is restricted to finite state sets. By restricting our scope to considering security attacks, we achieve an efficient executable specification of a model checking algorithm for attack trees. We provide the existing background, the necessary theory and illustrate its application. Theory and application are fully formalized in Isabelle thus providing an executable model checking algorithm.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (34)
  1. M. Bittner and F. Kammüller. Translating fusion/uml to object-z. In First ACM and IEEE International Conference on Formal Methods and Models, MEMOCODE’03. IEEE, 2003.
  2. Modeling human behaviour with higher order logic: Insider threats. In STAST’14. IEEE, 2014. co-located with CSF’14 in the Vienna Summer of Logic.
  3. The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud). SEI Series in Software Engineering. Addison-Wesley Professional, 1 edition, Feb. 2012.
  4. CHIST-ERA. Success: Secure accessibility for the internet of things, 2016. http://www.chistera.eu/projects/success.
  5. Model Checking. The MIT Press, 1999.
  6. S. Helke and F. Kammüller. Representing hierarchical automata in interactive theorem provers. Theorem Proving in Higher Order Logics, 14th International Conference, TPHOLs 2001, Edinburgh, Scotland, UK, September 3-6, 2001, Proceedings, volume 2152 of Lecture Notes in Computer Science, pages 233--248. Springer, 2001.
  7. S. Helke and F. Kammüller. Structure preserving data abstractions for statecharts. Formal Techniques for Networked and Distributed Systems - FORTE 2005, 25th IFIP WG 6.1 International Conference, Proceedings, volume 3731 of Lecture Notes in Computer Science, pages 305--319. Springer, 2005.
  8. S. Helke and F. Kammüller. Formalizing statecharts using hierarchical automata. Arch. Formal Proofs, 2010, 2010.
  9. F. Kammüller. Modular reasoning in isabelle. In D. MacAllester, editor, 17th International Conference on Automated Deduction, CADE-17, volume 1831 of LNAI. Springer, 2000.
  10. F. Kammüller. Isabelle modelchecking for insider threats. In Data Privacy Management, DPM’16, 11th Int. Workshop, volume 9963 of LNCS. Springer, 2016. Co-located with ESORICS’16.
  11. F. Kammüller. Formal models of human factors for security and privacy. In 5th International Conference on Human Aspects of Security, Privacy and Trust, HCII-HAS 2017, volume 10292 of LNCS, pages 339--352. Springer, 2017. Affiliated with HCII 2017.
  12. F. Kammüller. Human centric security and privacy for the iot using formal techniques. In 3d International Conference on Human Factors in Cybersecurity, volume 593 of Advances in Intelligent Systems and Computing, pages 106--116. Springer, 2017. Affiliated with AHFE’2017.
  13. F. Kammüller. A proof calculus for attack trees. In Data Privacy Management, DPM’17, 12th Int. Workshop, volume 10436 of LNCS. Springer, 2017. Co-located with ESORICS’17.
  14. F. Kammüller. Attack trees in isabelle. In 20th International Conference on Information and Communications Security, ICICS2018, volume 11149 of LNCS. Springer, 2018.
  15. F. Kammüller. Formal modeling and analysis of data protection for gdpr compliance of iot healthcare systems. In IEEE Systems, Man and Cybernetics, SMC2018. IEEE, 2018.
  16. F. Kammüller. Isabelle infrastructure framework with iot healthcare s&p application, 2018. Available at https://github.com/flokam/IsabelleAT.
  17. F. Kammüller. Attack trees in isabelle extended with probabilities for quantum cryptography. Computer & Security, 87, 2019.
  18. F. Kammüller. Combining secure system design with risk assessment for iot healthcare systems. In Workshop on Security, Privacy, and Trust in the IoT, SPTIoT’19, colocated with IEEE PerCom. IEEE, 2019.
  19. F. Kammüller. Dependability engineering in isabelle, 2021. arxiv preprint, http://arxiv.org/abs/2112.04374.
  20. F. Kammüller. Explanation by automated reasoning using the isabelle infrastructure framewor. In Artificial Intelligence in HCI, volume 13518 of LNCS. Springer, 2022. co-located with HCII International.
  21. F. Kammüller. Explanation of black box ai for gdpr related privacy using isabelle. In Data Privacy Management DPM’22, volume 13619 of LNCS. Springer, 2022. co-located with ESORICS’22.
  22. F. Kammüller. Introducing distributed ledger security into system specifications with the isabelle rr-cycle. In 2nd International Workshop on System Security Assurance (SecAssure), LNCS. Springer, 2023. co-located with the 28th European Symposium on Research in Computer Security (ESORICS 2023) to appear.
  23. F. Kammüller and C. M. Alvarado. Exploring rationality of self awareness in social networking for logical modeling of unintentional insiders. In HCI for Cybersecurity, Privacy and Trust, volume 13333 of LNCS. Springer, 2022. co-located with HCII International.
  24. F. Kammüller and M. Kerber. Investigating airplane safety and security against insider threats using logical modeling. In IEEE Security and Privacy Workshops, Workshop on Research in Insider Threats, WRIT’16. IEEE, 2016.
  25. F. Kammüller and M. Kerber. Applying the isabelle insider framework to airplane security. Science of Computer Programming, 206, 2021.
  26. Towards formal analysis of insider threats for auctions. In 8th ACM CCS International Workshop on Managing Insider Security Threats, MIST’16. ACM, 2016.
  27. Insider threats for auctions: Formal modeling, proof, and certified code. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 8(1), 2017.
  28. F. Kammüller and B. Lutz. Modeling and analyzing the corona-virus warning app with the isabelle infrastructure framework. In 20th International Workshop of Data Privacy Management, DPM’20, volume 12484 of LNCS. Springer, 2020. Co-located with ESORICS’20.
  29. F. Kammüller and U. Nestmann. Inter-blockchain protocols with the isabelle infrastructure framework. In Formal Methods for Blockchain, 2nd Int. Workshop, colocated with CAV’20, Open Access series in Informatics. Dagstuhl publishing, 2020. To appear.
  30. Attack tree analysis for insider threats on the IoT using Isabelle. In Human Aspects of Information Security, Privacy, and Trust - Fourth International Conference, HAS 2015, Held as Part of HCI International 2016, Toronto, Lecture Notes in Computer Science. Springer, 2016. Invited paper.
  31. F. Kammüller and L. C. Paulson. A formal proof of sylow’s theorem. Journal of Automated Reasoning, 23(3):235--264, 1999.
  32. F. Kammüller and J. W. Sanders. Heuristics for refinement relations. In Second Interational Conference of Software Engineering and Formal Methods, SEFM’04. IEEE, 2004.
  33. Locales -- a sectioning concept for Isabelle. In Y. Bertot, G. Dowek, A. Hirschowitz, C. Paulin, and L. Thery, editors, Theorem Proving in Higher Order Logics, 12th International Conference, TPHOLs’99, volume 1690 of LNCS. Springer, 1999.
  34. B. Schneier. Secrets and Lies: Digital Security in a Networked World. John Wiley & Sons, 2004.

Summary

We haven't generated a summary for this paper yet.