首页> 外文会议>International conference on information security practice and experience >Using the B Method to Formalize Access Control Mechanism with TrustZone Hardware Isolation (Short Paper)
【24h】

Using the B Method to Formalize Access Control Mechanism with TrustZone Hardware Isolation (Short Paper)

机译:使用B方法通过TrustZone硬件隔离形式化访问控制机制的正式化(简短论文)

获取原文

摘要

Successfully employed in the industry, hardware isolation environment enhances the access control of traditional operating systems and requires more rigorous analysis. This paper first applies the B method to the access control mechanism formalization and proposes an extensible formal model, which not only specifies the access control mechanism with process state transition in Linux, but also introduces the hardware isolation description. Consistent with program implementations, the B specifications can be animated and verified. The proposed B model constructs a mathematical framework for the security analysis, providing a theoretical support for mechanism enhancements. All the model components are type checked by Atelier B, with 547 proof obligations automatically generated. The current rate of model proof is 79%. The experimental results by ProB show that there is no invariant violation or deadlock. In conclusion, this paper presents a feasible solution for access control mechanism formalization and verification in the embedded system design. The access control model can be further extended and refined, with its specifications transformed into executable codes after proved.
机译:硬件隔离环境在业界成功应用,可以增强传统操作系统的访问控制,并且需要进行更严格的分析。本文首先将B方法应用于访问控制机制的形式化,并提出了一种可扩展的形式化模型,该模型不仅指定了Linux中进程状态转换的访问控制机制,而且还介绍了硬件隔离的描述。与程序实现一致,可以对B规范进行动画处理和验证。提出的B模型为安全性分析构建了数学框架,为机制增强提供了理论支持。所有模型组件均由Atelier B进行类型检查,并自动生成547个证明义务。当前的模型验证率为79%。 ProB的实验结果表明没有不变的冲突或死锁。总之,本文为嵌入式系统设计中的访问控制机制的形式化和验证提供了一种可行的解决方案。访问控制模型可以进一步扩展和完善,经过验证,其规范可以转换为可执行代码。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号