a formal connection between security properties and jml
play

A Formal Connection between Security Properties and JML Annotations - PowerPoint PPT Presentation

A Formal Connection between Security Properties and JML Annotations Work in progress with Marieke Huisman Alejandro Tamalet Radboud University Nijmegen, The Netherlands Introduction: The Goal Trusted devices (smart phones, PDA, smart


  1. A Formal Connection between Security Properties and JML Annotations Work in progress with Marieke Huisman Alejandro Tamalet Radboud University Nijmegen, The Netherlands

  2. Introduction: The Goal  Trusted devices (smart phones, PDA, smart cards) need a way to ensure the security of applications.  We want to enforce (at runtime) a certain property. Ultimately, we would like to prove (statically) that it holds.  We will work with Java or Java-like sequential programs. Tamalet - Radboud University 2

  3. Introduction: The Means  One way to achieve this goal is to encode the property as JML annotations  JML connects runtime checking (jmlc) and proving (ESC/Java2).  This imposes restrictions on the kind of properties we can express: only safety properties (no liveness). Tamalet - Radboud University 3

  4. Example: An applet protocol as an automaton (Cheon and Perumendla) destroy init stop start start init; (start; stop)+; destroy Tamalet - Radboud University 4

  5. Example: The applet protocol specified in JML (Cheon and Perumendla) @ requi res st at e I NI T st at e STO P package j ava appl et / / == | | == ; . @ ensures st at e START / / == ; publ i c voi d st ar t publ i c cl ass Appl et ( ) { { @ set st at e START @ publ i c st at i c f i nal ghost i nt / / = ; / * @ PRI STI NE . . . = 1 , @ I NI T } = 2 , @ START = 3 , @ requi res st at e START @ STO P / / == ; = 4 , @ ensur es st at e STO P @ D ESTRO Y / / == ; = 5 ; publ i c voi d st op @ ( ) { * / @ set st at e STO P / / = ; @ publ i c ghost i nt st at e PRI STI NE . . . / / = ; } @ requi res st at e PRI STI N E / / == ; @ requi res st at e STO P @ ensures st at e I N I T / / == ; / / == ; @ ensures st at e D ESTRO Y publ i c voi d i ni t / / == ; ( ) { publ i c voi d dest r oy @ set st at e I NI T ( ) { / / = ; @ set st at e D ESTRO Y / / = ; . . . . . . } } . . . Tamalet - Radboud University 5

  6. Multi-Variable Automata (MVA)  We want to keep the high level view of these properties.  Regular automata are not enough to express many interesting properties. We use automata with variables.  An automaton specifies a property of a class called the monitored class. Tamalet - Radboud University 6

  7. Transitions  Transitions of an MVA have an event, a guard and actions.  The events can be entry to or exit of methods. We distinguish between a normal exit and an exceptional exit.  Guards and actions may involve fields of the monitored class or parameters of the method. Actions can only update variables of the automaton. Tamalet - Radboud University 7

  8. Example: Embedded transactions Property: At most N embedded transactions. bt = beginTransaction() bt, t<N → skip ct = commitTransaction() at = abortTransaction() bt, t:=t+1 entry Q2 exit normal bt, skip exit exceptional t:=0 Q1 → ct, t>0 Automaton: skip Monitored class: transactions.java ct, t:=t-1 Q = {Q1, Q2, Q3} → at, t >0 Σ = {bt, bt, bt, ct, ct, ct, at} t:=t-1 Q3 ct, skip vars A = {(t, int, 0)} vars P = {} Tamalet - Radboud University 8

  9. Other properties  Enforce and order in which methods are called: life cycle or protocol of an object.  Restrict the frequency of a particular method call. Example: m() can be called at most one time.  Method m1() can not or can only be called inside method m2(). Tamalet - Radboud University 9

  10. Characteristics of a MVA  The automaton must be deterministic.  We complete the transition function by adding an error state. We call it halted.  Since we work with safety properties, halted is a trap state.  We don't have accepted states. Tamalet - Radboud University 10

  11. Abstract correctness property P = program (may already have annotations) A = automaton describing a security property || = monitored by ≈ = equivalence relation Assumptions: P does not throw nor catch JML exceptions A is “ well formed ” and “ well behaved ” P || A ≈ ann_program(P, A) Tamalet - Radboud University 11

  12. Translation into JML... plus some code transformations  Some code transformations are needed to treat exceptions. We have to enclose the body in a t r y - cat ch f i nal l y block. -  If no code transformations are allowed we must restrict the expressiveness of the automata. We would only be able to talk about entry to methods. Tamalet - Radboud University 12

  13. ann_program: Two step translation  For the following algorithm, we focus more in its correctness than in its actual implementation.  For ease of verification, the translation is done in two steps. In the first step we do some abstractions and then we refine them in the second step. Tamalet - Radboud University 13

  14. Step 1 – 1: Add ghost variables  New ghost variables are added to encode the automaton.  Control points (including halted): integers initialized to a unique value.  Current control point (cp): integer initialized to the value of the initial control point.  Variables of the automaton: their type and initial value are provided by the automaton. Tamalet - Radboud University 14

  15. Step 1 – 1: Example @ publ i c st at i c f i nal ghost i nt / * @ HALTED = 0 , @ Q 1 = 1 , @ Q 2 = 2 , @ Q 3 = 3 ; @ * / @ publ i c ghost i nt cp Q / / = 1 ; @ publ i c ghost i nt t / / = 0 ; Tamalet - Radboud University 15

  16. Step 1 – 2: Strengthen invariant  The invariant is strengthened to assert that the current control point has not reached the error state . @ publ i c i nvari ant cp hal t ed / / ! = ; Tamalet - Radboud University 16

  17. Step 1 – 3: Annotate methods @ requi res pr e ; / / m() @ ensures pos ; / / m ( ) { assert pre & inv; pre_set { pre_set; @ annot at i ons r egar di ng / * m s ent r y @ ' * / } body { m s body body; ' } pos_set { @ annot at i ons r egar di ng / * m s nor m al exi t @ → ex ' * / → assert !ex } exc_set { assert inv; pos & inv; @ annot at i ons r egar di ng exc_set; / * pos_set; m s except i onal exi t @ ' * / } } Tamalet - Radboud University 17

  18. Step 1 – 4: Translate events  Each transition is translated independently of the type of its event (entry, exit normal or exit exceptional).  We assume the existence of an i f statement that works with ghost variables in the condition and in the branches. Tamalet - Radboud University 18

  19. Step 1 – 4: Example at @ i f ( cp Q @ i f ( cp Q && t / * == 1 ) { / * == 1 > 0 ) { @ i f ( t @ set t t > 0 ) { = – 1 ; @ set t t @ set cp Q = – 1 ; = 1 ; @ set cp Q @ el se { = 1 ; } @ el se { @ set cp HALTED } = ; @ set cp HALTED @ = ; } @ el se i f ( cp Q @ } == 2 ) { * / @ set cp HALTED = ; @ el se i f ( cp Q } == 3 ) { @ set cp HALTED = ; @ el se { / / cp HALTED } == @ set cp HALTED = @ } @ * / Tamalet - Radboud University 19

  20. Step 2 – 1: Refine if - 1  The i f for ghost variables are translated into a sequence of set statements using conditional statements. i f ( c ) { set x c a x : = ? : ; set x a : = ; set y c b y : = ? : ; set y b : = ; } Tamalet - Radboud University 20

  21. Step 2 – 1: Refine if - 2  Two auxiliary ghost variables are used to ensure the independence of the branches. i f ( cp Q set b cp Q 1 = == 1 ; == 1 ) { i f ( x set b b && x 2 = 1 >= 5 ; >= 5 ) { set x x set x b x x = 2 ? - 1 : ; = - 1 ; set cp Q set cp b Q cp = 2 ? 2 : ; = 2 ; } i f ( x set b b && b && x 2 = 1 ! 2 < 0 ; < 0 ) { set x x set x b x x = 2 ? +1 : ; = +1 ; set cp Q set cp b Q y = 2 ? 1 : ; = 1 ; } el se { set b b && b 2 = 1 ! 2 ; set cp HALTED set cp b HALTED cp = 2 ? : ; = ; } } Tamalet - Radboud University 21

  22. Step 2 – 2: Refine pre_set et al. m cat ch ( Except i on e { ( ) { ) @ ghost bool ean ex @ exc_set / / ; / / ; @ set ex t rue ; t ry { / / = t hrow e @ pr e_set ; / / ; } f i nal l y { @ assert cp hal t ed / / ! = ; @ i f ( ! ex pos_exc / / ) { ; } body } } } Tamalet - Radboud University 22

  23. Example: translation of the embedded transactions publ i c voi d begi nTr ansact i on ( ) { @ ghost bool ean ex / / ; t ry { @ set cp cp Q && t N Q HALTED / / = ( == 1 < ) ? 2 : ; @ assert cp HALTED / / ! = ; body } cat ch ( Except i on e ) { @ set cp cp Q Q HALTED / / = ( == 2 ) ? 1 : ; @ set ex t rue ; / / = } f i nal l y { @ set t ex && cp Q t t / / = ( ! == 2 ) ? +1 : ; @ set cp ex && cp Q Q HALTED / / = ( ! == 2 ) ? 1 : ; } } Tamalet - Radboud University 23

  24. Formalization  Everything must be defined:  Automatons and their operational semantics.  (A subset of) Java programs with annotations and their operational semantics (big step, based on Von Oheimb's formalization).  A semantics for monitored programs.  A bisimulation relation. Tamalet - Radboud University 24

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend