Formal Methods for Security Engineering (FM-SecEng)

Principal Investigator: Prof. Dr.-Ing. Heiko Mantel
Funded by: DFG (German Research Foundation), within the Computer Science Action Program (Aktionsplan Informatik)
Project Duration: 01.08.2005–31.05.2013

Project Summary

During the development of security-critical software systems, security aspects like confidentiality, integrity, and availability need to be addressed in addition to functional and other non-functional requirements. The goal of the FM-SecEng-project was to develop novel methods, techniques, and tools that support security engineering, i.e., the development of security-critical systems. The overall objective of the project was to contribute to more trustworthy software systems by enabling the derivation of reliable, end-to-end security guarantees based on formal methods.

The scope of FM-SecEng ranged from the formal definition of security requirements by security properties through the step-wise development of software systems by composition and refinement to the verification of critical security requirements for concrete programs and for more abstract system specifications. The work-program was structured into three areas:

  1. Security Properties,
  2. Stepwise System Development, and
  3. Security Analysis.

Within the project area A) Security Properties, the focus was on the specification of security requirements based on information-flow properties. The scientific goals were to improve the understanding of this important class of security properties, based on both concrete examples and theoretical studies; to augment the application spectrum of information-flow properties by identifying novel properties as well as by providing adequate formal definitions of them; and to support engineers in employing information-flow properties during the development of security-critical systems, from the choice of a suitable property to the use of this property.

Within the project area B) Stepwise System Development, the focus was, firstly, on clarifying the interplay between security and stepwise system development and, secondly, on supporting the rigorous treatment of security aspects in stepwise system development. More concretely, the main foundational questions were how security is affected in detail by composition and refinement (it had been known already that, in general, composition and refinement both do not preserve security); which security properties can be established by employing particular security mechanisms; and how security interacts with other system requirements.

Within the project area C) Security Analysis, the focus was on the verification of security properties, from the study of existing program analysis and verification techniques to the development of novel security analyses and their prototypical implementation. The scientific goals were to achieve a deeper understanding of the pros and cons of existing program analyses, in particular of the various security type systems; to investigate and to elaborate other possibilities for verifying information-flow security than security type systems; and to develop techniques that security engineers can employ for removing certain insecurities from systems.

Relevant Publications

Master/Diploma/Bachelor Theses

  • Jens Korinth. Preserving Information Flow Properties of CSP Specifications under Refinement. Master Thesis, TU Darmstadt, 2013.
    BibTeX entry ]
  • Patrick Metzler. Tool Support for Step-Wise Analysis and Mitigation of Timing Channels in Java. Bachelor Thesis, TU Darmstadt, 2013.
    BibTeX entry ]
  • Dominic Scheurer. Enforcing Datalog Policies with Service Automata on Distributed Version Control Systems. Bachelor Thesis, TU Darmstadt, 2013.
    BibTeX entry ]
  • Markus Tasch. Exemplary Specification of Integrity Requirements by Information-Flow Properties. Bachelor Thesis, TU Darmstadt, 2013.
    BibTeX entry ]
  • Alexander Gebhardt. Monitoring C Programs by Finite State Machines. Master Thesis, TU Darmstadt, 2012.
    BibTeX entry ]
  • Sogol Mazaheri. Race Conditions in Distributed Enforcement at the Example of Online Social Networks. Bachelor Thesis, TU Darmstadt, 2012.
    BibTeX entry ]
  • Jan Mundo. Analyse von C-Programmen bezüglich Secure Coding mittels LTL-Modelchecking. Bachelor Thesis, TU Darmstadt, 2012.
    BibTeX entry ]
  • Daniel Specht. A Formal Model and Tool for Data Flow Security in Computer Networks. Bachelor Thesis, TU Darmstadt, 2012.
    BibTeX entry ]
  • Daniel Staesche. Security Preserving Refinement of CSP Specifications. Master Thesis, TU Darmstadt, 2012.
    BibTeX entry ]
  • Florian Wendel. An Evaluation of Delegation Strategies for Coordinated Enforcement. Bachelor Thesis, TU Darmstadt, 2012.
    BibTeX entry ]
  • Tobias Plötz. Vertraulichkeit von Werten im Modular Assembly Kit for Security (MAKS). Bachelor Thesis, TU Darmstadt, 2011.
    BibTeX entry ]
  • Sylvia Grüner. Formale Spezifikation von Sicherheitsanforderungen mit MAKS in Isabelle/HOL. Bachelor Thesis, TU Darmstadt, 2010.
    BibTeX entry ]
  • Jens Korinth. Relating Process Semantics by Equivalence-Preserving Transformations. Bachelor Thesis, TU Darmstadt, 2010.
    BibTeX entry ]
  • Timo Schneider. Model Checking von Informationsflusseigenschaften. Master Thesis, TU Darmstadt, 2010.
    BibTeX entry ]
  • Oliver Bračevac. Verhaltensintegrität von Programmen unter nebenläufigen Dateisystemzugriffen. Bachelor Thesis, TU Darmstadt, 2010.
    BibTeX entry ]
  • Sven Amann. Spezifikation und Codegenerierung von Sicherheitsautomaten. Bachelor Thesis, TU Darmstadt, 2009.
    BibTeX entry ]
  • Steffen Lortz. Typbasierte Informationsflussanalyse für JVM-Programme auf Mobilgeräten. Bachelor Thesis, TU Darmstadt, 2009.
    BibTeX entry ]
  • Richard Gay. Interrupt-Related Covert Channels from an Attacker's Perspective. Diploma Thesis, RWTH Aachen, 2008.
    BibTeX entry | PDF ]
  • Matthias Perner. Information Flow Analysis for CIL. Bachelor Thesis, TU Darmstadt, 2008.
    BibTeX entry | PDF ]
  • Timo Schneider. Fallstudie: Sicherheitsautomat für einen orchestrierten Dienst in einer serviceorientierten Architektur. Bachelor Thesis, TU Darmstadt, 2008.
    BibTeX entry ]
  • Alexander Reinhard. Analyse nebenläufiger Programme unter intransitiven Sicherheitspolitiken. Diploma Thesis, RWTH Aachen, 2006.
    BibTeX entry | PDF ]
A A A | Print | Imprint | Sitemap | Contact
zum Seitenanfang