Analysing security protocols using refinement in iUML-B

Snook, Colin, Hoang, Thai and Butler, Michael (2017) Analysing security protocols using refinement in iUML-B At 9th NASA Formal Methods Symposium, Moffett Field, CA, United States. 16 - 18 May 2017.


[img] PDF VLANTAG_NASA17 - Accepted Manuscript
Available under License University of Southampton Accepted Manuscript Licence.

Download (435kB)


We propose a general approach based on abstraction and refinement for constructing and analysing security protocols using formal specification and verification. We use class diagrams to specify conceptual system entities and their relationships. We use state-machines to model the protocol execution involving the entities' interactions. Features of our approach include specifying security principles as invariants of some abstract model of the overall system. The specification is then refined to introduce implementable mechanisms for the protocol. A gluing invariant specifies why the protocol achieves the security principle. Security breaches arise as violations of the gluing invariant. We make use of both theorem proving and model checking techniques to analyse our formal model, in particular, to explore the source and consequence of the security attack. To demonstrate the use of our approach we explore the mechanism of a security attack in a network protocol.

Item Type: Conference or Workshop Item (Paper)
Venue - Dates: 9th NASA Formal Methods Symposium, Moffett Field, CA, United States, 2017-05-16 - 2017-05-18
Related URLs:
Keywords: Virtual LAN, Security, Event-B, iUML-B
Organisations: Faculty of Physical Sciences and Engineering, Electronic & Software Systems
ePrint ID: 406508
Date :
Date Event
4 February 2017Accepted/In Press
16 May 2017Published
Date Deposited: 18 Mar 2017 02:21
Last Modified: 09 Jun 2017 09:44
Further Information:Google Scholar

Actions (login required)

View Item View Item