Skip to main content

A Framework for Contract-Policy Matching Based on Symbolic Simulations for Securing Mobile Device Application

  • Conference paper
Book cover Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2008)

Abstract

There is a growing interest on programming models based on the notion of contract. In particular, in the security realm one could imagine the situation where either downloaded code or software service exposes their security-relevant behavior in a contract (that must to be fulfilled). Assuming to have already a mechanism to ensure that the program/service adheres to the contract, it just remains to check that the contract matches with the user security policy. We refer to this testing procedure as contract-policy matching.

We specialize this framework in the ambit of mobile devices. The contract and the user policy are formally expressed by using (symbolic) transition systems.

Then, contract-policy matching amounts to simulation checking, i.e., a contract transition system is simulated by a policy one. This means that we check if for each transition corresponding to a certain security action of the contract (and so possibly performed by the program), the policy system has a similar transition and resulting contract system is again simulated by the resulting policy one.

Showing some running examples, we eventually present an implementation of simulation-matching algorithm, developed in J2ME and suitable to run also on smart phones.

Work partially supported by EU project ‘‘Software Engineering for Service-Oriented Overlay Computers”(SENSORIA), Artist2 ‘‘Network of Excellence on Embedded Systems Design” and ”Secure Software and Services for Mobile Systems” (S3MS).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Dragoni, N., Martinelli, F., Massacci, F., Mori, P., Schaefer, C., Walter, T., Vetillard, E.: Security-by-contract (SxC) for software and services of mobile systems. In: At your service: Service Engineering in the Information Society Technologies Program. MIT Press, Cambridge (2008)

    Google Scholar 

  2. Dragoni, N., Massacci, F., Naliuka, K., Siahaan, I.: Security-by-contract: Toward a semantics for digital signatures on mobile code. In: López, J., Samarati, P., Ferrer, J.L. (eds.) EuroPKI 2007. LNCS, vol. 4582, pp. 297–312. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  3. Schneider, F.B.: Enforceable security policies. ACM Transactions on Information and System Security 3(1), 30–50 (2000)

    Article  MathSciNet  Google Scholar 

  4. Martinelli, F., Matteucci, I.: An approach for the specification, verification and synthesis of secure systems. Electr. Notes Theor. Comput. Sci. 168, 29–43 (2007)

    Article  Google Scholar 

  5. Aktug, I., Naliuka, K.: Conspec – A formal language for policy specification. Electr. Notes Theor. Comput. Sci. 197(1), 45–58 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  6. Erlingsson, Ú., Schneider, F.B.: Sasi enforcement of security policies: a retrospective. In: NSPW 1999: Proceedings of the 1999 workshop on New security paradigms, pp. 87–95. ACM, New York (2000)

    Google Scholar 

  7. Milner, R.: Communicating and mobile systems: the π-calculus. Cambridge University Press, Cambridge (1999)

    MATH  Google Scholar 

  8. Martinelli, F., Matteucci, I.: Through modeling to synthesis of security automata. Electr. Notes Theor. Comput. Sci. 179, 31–46 (2007)

    Article  Google Scholar 

  9. Hennessy, M., Lin, H.: Symbolic bisimulations. In: MFPS 1992: Selected papers of the meeting on Mathematical foundations of programming semantics, Amsterdam, The Netherlands, pp. 353–389. Elsevier Science Publishers, Amsterdam (1995)

    Google Scholar 

  10. Hennessy, M., Lin, H.: A Symbolic Approach to Value-Passing Processes. In: Handbook of Process Algebra. Elsevier, Amsterdam (2001)

    Google Scholar 

  11. Dragoni, N., Massacci, F., Naliuka, K., Siahaan, I., Quillinan, T., Matteucci, I., Schaefer, C.: Deliverable 2.1.4-Methodologies and tools for contract matching- S3MS European Project (2007)

    Google Scholar 

  12. Aktung, I.: Syntax and semantics of conspec (last visited 09/07/2008) (2007), https://trinity.dit.unitn.it/bscw/bscw.cgi/d33953/ConSpec

  13. Desmet, L., Joosen, W., Massacci, F., Philippaerts, P., Piessens, F., Siahaan, I., Vanoverberghe, D.: Security-by-contract on the.net platform, vol. 13, pp. 25–32. Elsevier Advanced Technology Publications, Oxford (2008)

    Google Scholar 

  14. Matteucci, I.: Automated synthesis of enforcing mechanisms for security properties in a timed setting. Electr. Notes Theor. Comput. Sci. 186, 101–120 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  15. Martinelli, F., Matteucci, I.: Partial model checking, process algebra operators and satisfiability procedures for (automatically) enforcing security properties. Technical report, IIT-CNR (2005) Presented at the International Workshop on Foundations of Computer Security (FCS 2005)

    Google Scholar 

  16. Ingolfsdottir, A., Lin, H.: Handbook of Processes Algebra. In: A Symbolic Approach to Value-passing Processes, ch. 7. Elsevier, Amsterdam (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Greci, P., Martinelli, F., Matteucci, I. (2008). A Framework for Contract-Policy Matching Based on Symbolic Simulations for Securing Mobile Device Application . In: Margaria, T., Steffen, B. (eds) Leveraging Applications of Formal Methods, Verification and Validation. ISoLA 2008. Communications in Computer and Information Science, vol 17. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88479-8_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-88479-8_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-88478-1

  • Online ISBN: 978-3-540-88479-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics