Computer Science ›› 2017, Vol. 44 ›› Issue (9): 142-147.doi: 10.11896/j.issn.1002-137X.2017.09.028

Previous Articles     Next Articles

Formal Design and Verification for Typical Security Gateway

WANG Rui-yun, ZHAO Guo-lei, CHANG Chao-wen and WANG Xue-jian   

  • Online:2018-11-13 Published:2018-11-13

Abstract: Security gateway which is designed in experience usually focuses on function implementation and is usually not designed according to security model.To solve this problem,we proposed a method of formally designing and verifying a typical security gateway.Firstly,we designed the typical security gateway’s security policy according to its security requirements.Secondly,we formally modeled the security policy and verified the security model’s internal consistency by means of BLP model.In the end,we verified the consistency between the security gateway’s functional specifications and its security model.To make sure the reasoning procedure’s correctness,we used the theorem prover Isabelle/HOL to formally describe the above work and help us deduce.Our work ensures the security of a typical security gateway in terms of its top-level design and plays certain referential significance on formal design of security gateway.

Key words: Typical security gateway,Formal design,BLP model,Functional specification,Consistency verification,Isabelle/HOL

[1] VIAPLANA A R.IpsecVPN[EB/OL].[2017-4-10].http://upcommons.upc.edu/handle/2099.2/2117.
[2] PHIFER L.Tunnel Vision:Choosing a VPN-SSL VPN vs IPSec VPN[EB/OL].http:/search security.techtarget.com/feature/Tunel-vision-Choosing-a-VPN-SLL-VPN-vs-IPSec-VPN.
[3] WU T,KUANG X H,FU Z L.Analysis and Suggestion of the Heartbleed [J].National Defense Science & Technology,2014,5(5):27-30.(in Chinese) 吴彤,匡兴华,傅中立.“心脏出血”漏洞的特点分析和对策建议[J].国防科技,2014,5(5):27-30.
[4] BIEBER P.Formal techniques for an ITSEC-E4 secure gateway[C]∥Computer Security Applications Conference,1996.IEEE,1996:236-245.
[5] BELL D E,LAPADULA L J.Secure computer system:mathematical foundation:MTR2527 [R].Belford:Mitrecorp,1973.
[6] ABRIAL J R.Modeling in Event-B:System and Software Engineering[M].Cambridge university Press,2010.
[7] COMMUNITY E E.Information Technology Security Evaluation Criteria (ITSEC)[R].Commission,1990.
[8] 沈晴霓.操作系统安全设计[M].北京:机械工业出版社,2013.
[9] BIBA K J.Integrity Considerations for Secure Computing Systems:Mitre Report MTR 3153[R].Belford:Mitrecorp,1975.
[10] DENNING D E.A lattice model of secure information flow[J].Communications of the ACM,1976,6(5):236-243.
[11] GOGUEN J A,MESEGUER J.Unwinding and Inference Control[C]∥1984 IEEE Symposium on Security and Privacy.IEEE,1984:75.
[12] NIPKOW T,PAULSON L C,WENZEL M.Isabelle/HOL:A proof assistant for higher-order logic[M].Springer,2002.
[13] CHAPMAN D B,ZWICKY E D.Building Internet firewalls[M]∥O’Reilly & Associates,Inc.,1995.
[14] COMER D E.Internetworking with TCP/IP[M].Beijing:Posts & Telecom Press,2002.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!