Skip to main content

Formal Modelling and Security Analysis of Inter-Operable Systems

  • Conference paper
  • First Online:
Advances and Trends in Artificial Intelligence. Theory and Practices in Artificial Intelligence (IEA/AIE 2022)

Abstract

Emerging technologies utilised in building modern systems make them inter-operable but potentially exposed to security threats. Thus, engineers need to consider the system structure and behaviour at the design level. This paper addresses the security risk assessment of inter-operable IoT systems designed in BIP (Behaviour-Interaction-Priority). For this purpose, we model different attacks scenarios from Microsoft STRIDE threats catalogue and identify the threats entry points in the component-port-connector architecture. Using standards communication styles such as message passing, we compose architectural components to model data flow between communication entities. We use BIP statistical model checking to assess the architecture conformance regarding security properties expressed in temporal logic.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    SDL: www.microsoft.com/security/sdl.

  2. 2.

    SPLC: www.adobe.com/security/splc.

  3. 3.

    MQTT: http://docs.oasis-open.org/mqtt/mqtt/v3.1.1/mqtt-v3.1.1.html.

  4. 4.

    CoAP: https://www.ietf.org/archive/id/draft-shelby-core-coap-01.txt.

  5. 5.

    BIP: https://www-verimag.imag.fr/TOOLS/DCS/bip/doc/latest/html/index.html.

  6. 6.

    http://xsb.sourceforge.net/.

References

  1. Stride threats in BIP. https://github.com/hakimuga/Threat_Modeling_BIP

  2. Amir, P.: The temporal logic of programs. In: 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, pp. 46–57. IEEE Computer Society, October 1977

    Google Scholar 

  3. Baouya, A., Chehida, S., Bensalem, S., Bozga, M.: Formal modeling and verification of blockchain consensus protocol for IoT systems. In: Proceedings of the 19th International Conference on New Trends in Intelligent Software Methodologies, Tools and Techniques, SoMeT 2020, 22–24 September 2020, vol. 327, pp. 330–342. IOS Press (2020)

    Google Scholar 

  4. van den Berghe, A., Yskout, K., Scandariato, R., Joosen, W.: A lingua franca for security by design. In: 2018 IEEE Cybersecurity Development (SecDev), pp. 69–76 (2018)

    Google Scholar 

  5. Chondamrongkul, N., Sun, J., Warren, I.: PAT approach to architecture behavioural verification, pp. 187–192, July 2019

    Google Scholar 

  6. Chondamrongkul, N., Sun, J., Warren, I.: Formal security analysis for software architecture design: an expressive framework to emerging architectural styles. Sci. Comput. Program. 206, 102631 (2021)

    Article  Google Scholar 

  7. Crnkovic, I.: Component-based software engineering for embedded systems. In: ICSE 2005, pp. 712–713 (2005)

    Google Scholar 

  8. Hussain, S., Erwin, H., Dunne, P.: Threat modeling using formal methods: a new approach to develop secure web applications. In: 2011 7th International Conference on Emerging Technologies, ICET 2011, September 2011

    Google Scholar 

  9. Kent, S.: Sherman Kent and the profession of intelligence analysis, center for the study of intelligence, central intelligence agency, p. 55, November 2002. https://www.cia.gov/library/kent-center-occasional-papers/vol1no5.htm

  10. Kruchten, P.: The 4+1 view model of architecture. IEEE Softw. 12(6), 42–50 (1995)

    Article  Google Scholar 

  11. Liu, Y., Sun, J., Dong, J.S.: PAT 3: An extensible architecture for building multi-domain model checkers. In: 22nd ISSRE 2011, pp. 190–199. IEEE (2011)

    Google Scholar 

  12. McGraw, G.: Software Security: Building Security in. Addison-Wesley Professional Computing Series. Addison-Wesley, United States (2006)

    Google Scholar 

  13. Microsoft, the STRIDE Threat Model: Microsoft corporation (2009). https://docs.microsoft.com/en-us/previous-versions/commerce-server/ee823878(v=cs.20)?redirectedfrom=MSDN

  14. Nouri, A., Mediouni, B.L., Bozga, M., Combaz, J., Bensalem, S., Legay, A.: Performance evaluation of stochastic real-time systems with the SBIP framework. Int. J. Crit. Comput. Based Syst. 8, 1–33 (2018)

    Google Scholar 

  15. Ouchani, S., Jarraya, Y., Ait Mohamed, O., Debbabi, M.: Probabilistic attack scenarios to evaluate policies over communication protocols. J. Softw. 7, 1488–1495 (2012)

    Article  Google Scholar 

  16. Ouchani, S., Mohamed, O.A., Debbabi, M.: A security risk assessment framework for SysML activity diagrams. In: IEEE 7th International Conference on Software Security and Reliability, pp. 227–236 (2013)

    Google Scholar 

  17. Rouland, Q., Hamid, B., Jaskolka, J.: Specification, detection, and treatment of stride threats for software components: modeling, formal methods, and tool support. J. Syst. Archit. 117, 102073 (2021)

    Article  Google Scholar 

  18. Sgandurra, D., Karafili, E., Lupu, E.: Formalizing threat models for virtualized systems. In: Ranise, S., Swarup, V. (eds.) DBSec 2016. LNCS, vol. 9766, pp. 251–267. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-41483-6_18

    Chapter  Google Scholar 

  19. U.S. Department of Homeland Security: Common attack pattern enumeration and classification, November 2002. http://capec.mitre.org

Download references

Acknowledgement

The research leading to the presented results has been undertaken within the research profile CPS4EU, funded by the European Union, grant number: 826276.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdelhakim Baouya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Baouya, A., Ouchani, S., Bensalem, S. (2022). Formal Modelling and Security Analysis of Inter-Operable Systems. In: Fujita, H., Fournier-Viger, P., Ali, M., Wang, Y. (eds) Advances and Trends in Artificial Intelligence. Theory and Practices in Artificial Intelligence. IEA/AIE 2022. Lecture Notes in Computer Science(), vol 13343. Springer, Cham. https://doi.org/10.1007/978-3-031-08530-7_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-08530-7_47

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-08529-1

  • Online ISBN: 978-3-031-08530-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics