当前位置: X-MOL 学术J. Inf. Secur. Appl. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Robustness verification of soft security systems
Journal of Information Security and Applications ( IF 3.8 ) Pub Date : 2020-10-08 , DOI: 10.1016/j.jisa.2020.102632
Amir Jalaly Bidgoly

Soft security is a new generation of security methods that, unlike traditional ones such as encryption and access control (known as hard security), uses social-based control to secure a system. Like any other security method, soft security methods should be evaluated and verified against attacks before they are used; however, despite the increasing attractiveness and applications of these methods, their assessment and evaluation techniques are still in the early stages of the research. The concept of attack in the soft security methods is carried out not by breaking the rules and penetrating the system, but by following a hypocritical and misleading behavior that ultimately leads to the system deception and bypassing its security mechanism. Currently, the most important method for robustness evaluation of soft security is simulation that is not capable of providing a proof of system security. The research works which proposed a verification method for soft security systems are limited. In this paper, the challenges of the robustness verification of soft security systems are investigated, and a formal method for quantitative verification of these systems is proposed. The proposed method also introduces a robustness measure based on the worst possible attack against the system. Moreover, it is capable of finding new attacks against a system. The application of the proposed method is represented using some trust systems case studies.



中文翻译:

软安全系统的稳健性验证

软安全性是新一代的安全性方法,与诸如加密和访问控制(称为硬性安全性)之类的传统方法不同,它使用基于社交的控制来保护系统。与其他任何安全方法一样,应在使用软安全方法之前对它们进行评估和验证,以防受到攻击。然而,尽管这些方法的吸引力和应用越来越广泛,但它们的评估和评估技术仍处于研究的早期阶段。软安全性方法中的攻击概念不是通过破坏规则并渗透到系统中来执行的,而是通过遵循虚伪的具有误导性的行为来实现的,该行为最终导致系统欺骗并绕过其安全性机制。目前,评估软安全性的最重要方法是无法提供系统安全性证明的仿真。提出用于软安全系统的验证方法的研究工作是有限的。本文研究了软安全系统的鲁棒性验证所面临的挑战,并提出了对这些系统进行定量验证的正式方法。所提出的方法还基于对系统的最坏可能的攻击引入了鲁棒性度量。而且,它能够发现针对系统的新攻击。使用一些信任系统案例研究来代表所提出方法的应用。对软安全系统的鲁棒性验证提出了挑战,并提出了对这些系统进行定量验证的正式方法。所提出的方法还基于对系统的最坏可能的攻击引入了鲁棒性度量。而且,它能够发现针对系统的新攻击。使用一些信任系统案例研究来代表所提出方法的应用。对软安全系统的鲁棒性验证提出了挑战,并提出了对这些系统进行定量验证的正式方法。所提出的方法还引入了基于对系统的最坏可能的攻击的鲁棒性度量。而且,它能够发现针对系统的新攻击。使用一些信任系统案例研究来代表所提出方法的应用。

更新日期:2020-10-11
down
wechat
bug