{"title":"Modeling and validation for embedded software confidentiality and integrity","authors":"Xinwen Hu, Zhuang Yi, Zining Cao, Tong Ye, Mi Li","doi":"10.1109/ISKE.2017.8258789","DOIUrl":null,"url":null,"abstract":"With the rapid development of embedded software, embedded software has a highly security demand, such as confidentiality and integrity. UML provides the foundation for the construction and analysis of embedded software, but it cannot provide accurate semantics for the validation of embedded software security properties. Using the formal method based on Z language to model the security properties of embedded software, can provide the rigorous semantics for the security properties of embedded software, which can help to discover its early design errors and reduce the cost of testing and maintenance. Developing the model transformation tool of UML model to Z model, which can avoid repetitive modeling of the manual establishment of Z model, reduce the possibility of introducing artificial logic error in the model. Verifying the correctness of the confidentiality and integrity model by using the formal verification tool Z/EVES, which can make the embedded software satisfy the user's security requirement. This paper construct the static structure model and dynamic behavior model of embedded software confidentiality and integrity modeling based on Z at first; and then establish the model transformation rules of UML modeling elements to Z modeling elements, which is designed and implemented based on the XSLT technology; finally, the formal model is validated by using the verification tool Z/EVES through the example of a bicycle parking embedded software, and the correctness of the embedded software security model presented in this paper is explained.","PeriodicalId":208009,"journal":{"name":"2017 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISKE.2017.8258789","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
With the rapid development of embedded software, embedded software has a highly security demand, such as confidentiality and integrity. UML provides the foundation for the construction and analysis of embedded software, but it cannot provide accurate semantics for the validation of embedded software security properties. Using the formal method based on Z language to model the security properties of embedded software, can provide the rigorous semantics for the security properties of embedded software, which can help to discover its early design errors and reduce the cost of testing and maintenance. Developing the model transformation tool of UML model to Z model, which can avoid repetitive modeling of the manual establishment of Z model, reduce the possibility of introducing artificial logic error in the model. Verifying the correctness of the confidentiality and integrity model by using the formal verification tool Z/EVES, which can make the embedded software satisfy the user's security requirement. This paper construct the static structure model and dynamic behavior model of embedded software confidentiality and integrity modeling based on Z at first; and then establish the model transformation rules of UML modeling elements to Z modeling elements, which is designed and implemented based on the XSLT technology; finally, the formal model is validated by using the verification tool Z/EVES through the example of a bicycle parking embedded software, and the correctness of the embedded software security model presented in this paper is explained.