2018 International Conference on High Performance Computing &Amp; Simulation (HPCS) 2018
DOI: 10.1109/hpcs.2018.00106
|View full text |Cite
|
Sign up to set email alerts
|

Towards Model Checking Security of Real Time Java Software

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…In order to avoid race conditions, the current toolchest of developers includes a number of instruments, techniques and methods, such as thread-safe libraries, process and thread synchronization methods, library functions that are guaranteed to operate atomically eliminating any TOCTOU-based errors [85] (e.g., the introduction of the faccess function enables the use of the secure fopen/faccess function sequence instead of the TOCTOU-vulnerable access/fopen function sequence). The exploitation of experience gained from operating system and parallel application development, coupled with the use of model-based checking tools such as [93][94][95], which are able to follow all possible application execution paths and more thoroughly cover the possible instruction interleaving sequences, may lead to a reduction of race condition introduction windows.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In order to avoid race conditions, the current toolchest of developers includes a number of instruments, techniques and methods, such as thread-safe libraries, process and thread synchronization methods, library functions that are guaranteed to operate atomically eliminating any TOCTOU-based errors [85] (e.g., the introduction of the faccess function enables the use of the secure fopen/faccess function sequence instead of the TOCTOU-vulnerable access/fopen function sequence). The exploitation of experience gained from operating system and parallel application development, coupled with the use of model-based checking tools such as [93][94][95], which are able to follow all possible application execution paths and more thoroughly cover the possible instruction interleaving sequences, may lead to a reduction of race condition introduction windows.…”
Section: Discussionmentioning
confidence: 99%
“…We also plan to consider the combined assessment of results concerning communication protocol security through relevant simulation-based tools (e.g., Scyther) on the one hand (e.g., [99][100][101]), and results from the software implementation security assessment on the other hand, towards the computation of a comprehensive risk level of 5G and smart grid systems. Finally, the effectiveness of model-based checking tools such as [93][94][95] in the identification of security-related issues, and the interplay between secure software development practices and the operation of forensics in the domain of 5G and Smart Grid computing [107] will be studied.…”
Section: Discussionmentioning
confidence: 99%
“…First of all, one of the strengths of the methodology, i.e., the fact that the user can specify the abstraction predicates using a high-level language, proves itself helpful to model check the correctness of the algorithms . In the considered case studies, we already knew which bugs were present and we used such knowledge as a validation mechanism for testing the correct implementation of the tool (Spalazzi et al 2018;Liva et al 2018). In Fisher's algorithm, we also benefit from being able to test different encodings of the same mutual exclusion requirement.…”
Section: Experimental Validationmentioning
confidence: 99%
“…A previous version of this work (Spalazzi et al 2018) showed some core components of our approach. In this work, we extend the translation rules, we prove the soundness of the produced network of timed automata, and we apply it to more software projects.…”
mentioning
confidence: 99%
“…Modern programming languages, such as Java, C, and C#, offer APIs to manipulate and model time as timestamp using integer variables. Recent works [21], [22], [23] show how the timestamp representation is fragile in the context of mainstream programming languages. Integer Overflows due to manipulation of timestamps could be dangerous and exploited to violate the security offered by modern operating systems.…”
Section: Introductionmentioning
confidence: 99%