期刊文献+

基于模型的开发方法在多应用智能卡中的应用 被引量:2

Application of Model-based Development Method in Multi- Application Smart Cards
在线阅读 下载PDF
导出
摘要 安全性、可靠性是嵌入式软件的重要性质。为了更好地保证开发的嵌入式软件是可靠和安全的,提出了一种基于模型的开发方法学,包括提炼需求、建立抽象模型及逐层精化三个步骤。首先从环境、功能、性质三个主要方面提取需求,同时明确层次化的精化策略;然后利用形式化方法建立抽象模型并对该模型进行形式化验证,在正确的抽象模型上逐层精化,并对每层模型进行验证;最后,基于满足需求的模型,进一步利用工具完成代码自动生成。该方法从抽象到具体,以逐层递增的方式明确被开发系统的需求及性质,进行形式化建模,通过反馈机制确保模型的正确性及可用性。为了证明该方法学的可行性,文章以多应用智能卡为开发实例,基于Event-B方法及Rodin平台给出了实际建模及证明的过程和结果。 Reliability and security are two important aspects for embedded software. A model-based development method was proposed for better development of reliable and secure embedded software. It consists of extracting requirement, establishing abstract model, and step by step refining. Firstly, requirements are extracted from three different views: environmental view, functional view, and property view. During this phase, refinement strategy reflecting model hierarchy is also identified. Then formal methods are adopted in establishing abstract model and proving the established model. Using this well-proved abstract model, model refinement and proof are carried out at following levels of the model hierarchy. Finally, based on the whole established models corresponding to requirements, implementation codes can be automatically generated by related tools. With this model-based development method, requirements and properties of system under development can be identified from abstract to specific and incrementally. Modeling using formal methods can also be carried out in the above way and correctness and availability of models can be guaranteed by feedback mechanism of this method. To illustrate the feasibility of this method, the development of multi-application smart cards is shown as case study. Relevant processes and results are given based on Event-B and Rodin platform.
出处 《信息网络安全》 2013年第12期75-79,共5页 Netinfo Security
基金 上海市科委项目[12511504205] 信息网络安全公安部重点实验室开放课题[C12604]
关键词 智能卡 Event—B 形式化方法 定理证明 smart card Event-B formal method theory proof
  • 相关文献

参考文献10

二级参考文献34

  • 1韩卫,薛健,白灵.一种基于安全隧道技术的SSL VPN及其性能分析[J].科学技术与工程,2005,5(12):791-796. 被引量:12
  • 2Davi, L., Dmitrienko, A., Sadeghi, A.R. and Winandy, M.Privilege escalation attacks on android[J]. Information Security. 346-360.
  • 3Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y. and Dolev, S. Google Android: A state-of-the-art review of security mechanisms[J]. Arxiv preprmt arXiv:0912.5101.
  • 4ENCK, W., ONGTANG, M., AND MCDANIEL, P. 2009b. Understanding Android Security[J]. IEEE Security and Privacy, 7(01):50-57.
  • 5Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S. and Glezer, C.Google Android: A comprehensive security assessment[J]. Security & Privacy, IEEE, 8 (02). 35-44.
  • 6Chandhuri, A. Language-based security on Android[C]. Proceedings of the ACM SIGPLAN Fourth Workshop on Progrmnming Languages and Analysis for Security, 2009, 1-7.
  • 7C .Enrique Ortiz.理解Android上的安全性:利用沙箱、应用程序签名和权限增强应用程序安全性[EB/OL]. http://www.ibm.com/developerworks/cn/xml/x-androidsecurity/index.html, 2010 -12 -13.
  • 8Jingzheng Wu, Yongji Wang, Liping Ding, Xiaofeng Liao. Improving Performance of Network Covert Timing Channel through Huffman Coding[C]. The 2010 FTRA International Symposium on Advances in Cryptography, Security and Applicafom for Future Computing (ACSA 2010). Gwangju, Korea. Dec 9-11, 2010.
  • 9Jingzheng Wu, Yongji Wang, Liping Ding, Yanping Zhang. Constructing Scenario of Event-Flag Covert Channel in Secure Operating System[C]. 2rid International Conference on Information and Multimedia Technology (ICIMT 2010). Hongkong. Dec 28-30, 2010.
  • 10Tian Shuo, He Yeping, Ding Liping. A Countermeasure against Stack-smashing Attack Based on Canary Obtained through Nonlinear Transformation[C]. Proceedings of 2010 2rid International Conference on Information and Multimedia Technology (ICIMT 2010), Hong Kong 12.28-12.30.2010.

共引文献92

同被引文献7

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部