{"title":"TCG TOCTOU攻击响应机制的形式化分析","authors":"Xiaolin Chang, Bin Xing, Ying Qin","doi":"10.1109/MINES.2012.116","DOIUrl":null,"url":null,"abstract":"LWRM was a method for defeating TCG TOCTOU attacks with less overhead during the normal system execution. However, its security capability was evaluated only through experiments. The uncertainty in real experiments may hide the design-level errors. In this paper we explore applying model checking based formal verification techniques to verify whether LWRM can achieve the declared security properties. We first propose a method of modeling LWRM, a kernel-space mechanism, in PROMELA language. Then we detect the design-level vulnerabilities by using SPIN. At last we verify our analysis via experiments and present the challenges to mitigate the vulnerabilities.","PeriodicalId":208089,"journal":{"name":"2012 Fourth International Conference on Multimedia Information Networking and Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Formal Analysis of a Response Mechanism for TCG TOCTOU Attacks\",\"authors\":\"Xiaolin Chang, Bin Xing, Ying Qin\",\"doi\":\"10.1109/MINES.2012.116\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"LWRM was a method for defeating TCG TOCTOU attacks with less overhead during the normal system execution. However, its security capability was evaluated only through experiments. The uncertainty in real experiments may hide the design-level errors. In this paper we explore applying model checking based formal verification techniques to verify whether LWRM can achieve the declared security properties. We first propose a method of modeling LWRM, a kernel-space mechanism, in PROMELA language. Then we detect the design-level vulnerabilities by using SPIN. At last we verify our analysis via experiments and present the challenges to mitigate the vulnerabilities.\",\"PeriodicalId\":208089,\"journal\":{\"name\":\"2012 Fourth International Conference on Multimedia Information Networking and Security\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-11-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Fourth International Conference on Multimedia Information Networking and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MINES.2012.116\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Fourth International Conference on Multimedia Information Networking and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MINES.2012.116","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Formal Analysis of a Response Mechanism for TCG TOCTOU Attacks
LWRM was a method for defeating TCG TOCTOU attacks with less overhead during the normal system execution. However, its security capability was evaluated only through experiments. The uncertainty in real experiments may hide the design-level errors. In this paper we explore applying model checking based formal verification techniques to verify whether LWRM can achieve the declared security properties. We first propose a method of modeling LWRM, a kernel-space mechanism, in PROMELA language. Then we detect the design-level vulnerabilities by using SPIN. At last we verify our analysis via experiments and present the challenges to mitigate the vulnerabilities.