skip to main content
10.1145/1244002.1244325acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

Formal verification of security specifications with common criteria

Published: 11 March 2007 Publication History

Abstract

This paper proposes a formalization and verification technique for security specifications, based on common criteria. Generally, it is difficult to define reliable security properties that should be applied to validate an information system. Therefore, we have applied security functional requirements that are defined in the ISO/IEC 15408 common criteria to the formal verification of security specifications. We formalized the security criteria of ISO/IEC 15408 and developed a process, using Z notation, for verifying security specifications. We also demonstrate some examples of the verification instances using the theorem prover Z/EVES. In the verification process, one can verify strictly whether specifications satisfy the security criteria defined in ISO/IEC 15408.

References

[1]
Bertot, Y. and Casteran, P. Interactive Theorem Proving and Program Development. Springer-Verlag, 2004.
[2]
Clarke, E., Grumberg, O., and Peled, D. Model Checking. MIT Press, 2000.
[3]
Common Criteria Org. Evaluated Product Files. http://www.commoncriteriaportal.org/public/files/epfiles/
[4]
Dupuy, S., Ledru, Y., and Chabre-Peccoud, M. An Overview of RoZ: A Tool for Integrating UML and Z Specifications. In Proc. of the 12th international Conference on Advanced information Systems Engineering. B. Wangler and L. Bergman, Eds. Lecture Notes in Computer Science, vol. 1789, pages. 417--430, Springer-Verlag, 2000.
[5]
Hall, A. Z Styles for Security Properties and Modern User Interfaces. In Proc. of the Formal Aspects of the First International Conference. A. E. Abdallah, P. Ryan, and S. Schneider, Eds. Lecture Notes in Computer Science, vol. 2629, pages. 152--166, Springer-Verlag, 2002.
[6]
Hinchey, M. G. and Bowen, J. P. High-Integrity System Specification and Design. 1st. Springer-Verlag, 1999.
[7]
Horie, D., Morimoto, S., and Cheng, J. A Web User Interface of the Security Requirement Management Database Based on ISO/IEC 15408, In Proc. of Computational Science - ICCS 2006: 6th International Conference. V. N. Alexandrov et al., Eds. Lecture Notes in Computer Science, vol. 3994, pages. 797--804, Springer-Verlag, 2006.
[8]
ISO/IEC 13568 Standard. Information Technology - Z Formal Specification Notation - Syntax, Type System and Semantics. 2002.
[9]
ISO/IEC 15408 Standard. Information Technology - Security Techniques - Evaluation Criteria for IT Security. 1999.
[10]
Jacob, J. Basic Theorems About Security. J. Comput. Secur. 1, 3--4, pages. 385--411, 1992.
[11]
Long, B. W., Fidge, C. J., and Cerone, A. A Z Based Approach to Verifying Security Protocols. In Proc. of the 5th International Conference on Formal Engineering Methods. J. S. Dong and J. Wood-. cock, Eds. Lecture Notes in Computer Science, vol. 2885, pages. 375--395, Springer-Verlag, 2003.
[12]
Morimoto, S. and Cheng, J. Modeling Protection Profiles by UML and their Formal Verification. Systems and Computers in Japan. Wiley, 2007.
[13]
Morimoto, S. and Cheng, J. Patterning Protection Profiles by UML for Security Specifications. In Proc. of the international Conference on Computational intelligence For Modelling, Control and Automation and international Conference on intelligent Agents, Web Technologies and internet Commerce Vol-2 (Cimca-Iawtic'06) - Volume 02. pages. 946--951, IEEE Computer Society, 2005.
[14]
Morimoto, S., Horie, D., and Cheng, J. A Security Requirement Management Database Based on ISO/IEC 15408. In Proc. of Computational Science and Its Applications - ICCSA 2006, International Conference. M. Gavrilova et. al., Eds. Lecture Notes in Computer Science, vol. 3982, pages. 1--10, Springer-Verlag, 2006.
[15]
Oheimb, D. Interacting State Machines - a stateful approach to proving security -. In Proc. of the Formal Aspects of the First International Conference. A. E. Abdallah, P. Ryan, and S. Schneider, Eds. Lecture Notes in Computer Science, vol. 2629, pages. 15--32, Springer-Verlag, 2002.
[16]
ORA Canada, Z/EVES. http://www.ora.on.ca/z-eves/welcome.html
[17]
Potter, B., Till, D., and Sinclair, J. An Introduction to Formal Specification and Z. 2nd. Prentice Hall PTR, 1996.

Cited By

View all
  • (2023)Security requirements specification by formal methods: a research metadata analysisMultimedia Tools and Applications10.1007/s11042-023-17218-483:14(41847-41866)Online publication date: 13-Oct-2023
  • (2022)Defining Security Requirements With the Common Criteria: Applications, Adoptions, and ChallengesIEEE Access10.1109/ACCESS.2022.316871610(44756-44777)Online publication date: 2022
  • (2021)A review on security requirements specification by formal methodsConcurrency and Computation: Practice and Experience10.1002/cpe.670234:5Online publication date: 17-Nov-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '07: Proceedings of the 2007 ACM symposium on Applied computing
March 2007
1688 pages
ISBN:1595934804
DOI:10.1145/1244002
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 March 2007

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. ISO/IEC 15408
  2. Z notation
  3. theorem-proving

Qualifiers

  • Article

Conference

SAC07
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Upcoming Conference

SAC '25
The 40th ACM/SIGAPP Symposium on Applied Computing
March 31 - April 4, 2025
Catania , Italy

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)25
  • Downloads (Last 6 weeks)2
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Security requirements specification by formal methods: a research metadata analysisMultimedia Tools and Applications10.1007/s11042-023-17218-483:14(41847-41866)Online publication date: 13-Oct-2023
  • (2022)Defining Security Requirements With the Common Criteria: Applications, Adoptions, and ChallengesIEEE Access10.1109/ACCESS.2022.316871610(44756-44777)Online publication date: 2022
  • (2021)A review on security requirements specification by formal methodsConcurrency and Computation: Practice and Experience10.1002/cpe.670234:5Online publication date: 17-Nov-2021
  • (2019)A Security Modeling and Verification Method of Embedded Software Based on Z and MARTEComputers & Security10.1016/j.cose.2019.101615(101615)Online publication date: Sep-2019
  • (2013)Automatized high-level evaluation of security properties for RTL hardware designsProceedings of the Workshop on Embedded Systems Security10.1145/2527317.2527323(1-8)Online publication date: 29-Sep-2013
  • (2013)Supporting verification and validation of security targets with ISO/IEC 15408Proceedings 2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC)10.1109/MEC.2013.6885475(2621-2628)Online publication date: Dec-2013
  • (2013)Automated Reviewing of Healthcare Security PoliciesFoundations of Health Information Engineering and Systems10.1007/978-3-642-39088-3_12(176-193)Online publication date: 2013
  • (2011)Validation of security-design models using ZProceedings of the 13th international conference on Formal methods and software engineering10.5555/2075089.2075113(259-274)Online publication date: 26-Oct-2011
  • (2011)IdeaProceedings of the Third international conference on Engineering secure software and systems10.5555/1946341.1946369(264-271)Online publication date: 9-Feb-2011
  • (2011)Validation of Security-Design Models Using ZFormal Methods and Software Engineering10.1007/978-3-642-24559-6_19(259-274)Online publication date: 2011
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media