Modular Modeling of Delegation Security in Software Development (MoDelSec)
DFG-SPP RS3 (2010-2012)
The objective of this project is to develop an approach for considering advanced techniques in access control (in
particular delegation of user permissions) in the context of a formally-based software development methodology. The
approach will be based on formalizations from the Secure Information Flow approach to security verification, which
offers the possibility for a particularly fine-grained security analysis. Since secure information flow formalizations
have traditionally been used in the context of mandatory access control (MAC) which does not usually include user-level
permission delegation, investigation of delegation in this context has so far been limited. Since the Secure
Information Flow approach has found increasing use over the last few years, one of the goals of this project is
therefore to fill this gap by investigating how to support the analysis of sophisticated access control techniques such
as delegation of user permissions. A further objective is to exploit results on modular analysis of Secure Information
Flow properties in the context of the analysis of access control mechanisms and in particular the delegation of user
permissions. The scientific progress to be made will be transferred into the context of a secure software development
approach based on formal verification tool support. They will be validated using an application from the e-health
sector (in collaboration with existing projects in this domain at Fraunhofer ISST, where the Principal Investigator of
this project holds a secondary position). Main results of the project will include the following:
- A theory supporting the modular analysis of user permission delegation in the context of secure information flow
- Integration into the context of a secure software development approach based on formal verification tool
- Automated tools for formal verification based on SMT solvers (such as Z3).
- Validation through an application in an e-health system including access control with delegation.
- Jan Jürjens, Loïc Marchal, Martín Ochoa, Holger Schmidt: Incremental Security Verification for Evolving UMLsec models. In: Robert B. France, Jochen Malte, Behzad Bordbar, Richard F. Paige (editors): Modelling Foundations and Applications - 7th European Conference, ECMFA 2011, Birmingham, UK, June 6 - 9, 2011 Proceedings, Springer, Lecture Notes in Computer Science, vol. 6698, pp. 52-68, 2011.
- Frank Hadasch, Andreas Lehmann, Stefan Pfeiffer, Thomas Ruhroth, Thomas Stocker: RS3 Reference Scenario: Enterprise Systems (Static Analysis) 2012
- M. Ochoa, J. Jürjens, D. Warzecha: A Sound Decision Procedure for the Compositionality of Secrecy. In: 4th International Symposium on Engineering Secure Software and Systems (ESSoS'12), Springer, lncs, vol. 7159, pp. 97-105, 2012.
- B. Köpf, L. Mauborgne, M. Ochoa: Automatic Quantification of Cache Side-Channels. In: Computer Aided Verification (CAV 2012), sv, lncs, 2012. Accepted for publication.
- M. Ochoa: Model-based Security Guarantees and Change TU Dortmund, 2012 (PhD-Thesis).
- M. Ochoa, J. Jürjens, J. Cuéllar: Non-interference on UML State-charts. In: 50th International Conference on Objects, Models, Components, Patterns (TOOLS Europe 2012), Springer, LNCS, pp. 15pp., 2012. To appear.