Stepney, Susan orcid.org/0000-0003-3146-5401, Clark, John Andrew orcid.org/0000-0002-9230-9739
and Chivers, Howard
(2004)
Breaking the Model:finalisation and a taxonomy of security attack.
Report.
York Computer Science Technical Report
.
Department of Computer Science, University of York
Abstract
It is well known that security properties are not preserved by refinement, and that refinement can introduce new, covert, channels, such as timing channels. The finalisation step in refinement can be analysed to identify some of these channels, as unwanted finalisations that can break the assumptions of the formal model. We introduce a taxonomy of such unwanted finalisations, and give examples of attacks that exploit them.
Metadata
Item Type: | Monograph |
---|---|
Authors/Creators: |
|
Copyright, Publisher and Additional Information: | Freely available. |
Keywords: | Finalisation,Observed system,Security model assumptions |
Dates: |
|
Institution: | The University of York |
Academic Units: | The University of York > Faculty of Sciences (York) > Computer Science (York) |
Depositing User: | Pure (York) |
Date Deposited: | 07 Jun 2012 19:23 |
Last Modified: | 24 Jan 2025 00:00 |
Status: | Published |
Publisher: | Department of Computer Science, University of York |
Series Name: | York Computer Science Technical Report |
Open Archives Initiative ID (OAI ID): | oai:eprints.whiterose.ac.uk:72498 |