• Title/Summary/Keyword: 모델 체킹

Search Result 79, Processing Time 0.024 seconds

A Study on Formal Design of Access Control Model using SMV (SMV를 이용한 접근통제모델의 정형적 설계방법 연구)

  • 황대연;강인혜;강필용;이완석;최진영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.721-723
    • /
    • 2003
  • 컴퓨터 시스템에 대한 보안의 필요성이 계속적으로 증대되고 있으며 이에 다양한 보안시스템들이 개발되고 있다. 이러한 보안 시스템들이 높은 등급의 평가를 받기 위해서는 정형적 방법론을 사용하여 명세 및 검증을 해야 한다. 본 논문에서는 정형 검증의 한 방법론인 모델 체킹을 이용하여 접근통제모델을 설계하고 검증하는 방법을 제안하고자 한다.

  • PDF

The Analysis of RADIUS protocol using CSP/FDR (CSP/FDR을 이용한 RADIUS 프로토콜 분석)

  • 김일곤;최진영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.239-241
    • /
    • 2003
  • 무선 인터넷의 활성화와 더불어, 사용자 인중(Authentication), 권한 부여(Accounting) 그리고 자원사용(Accounting)의 세가지 AAA 서비스를 효율적으로 제공하기 위해 RADIUS와 같은 AAA프로토콜들이 사용되고 있다. 본 논문에서는 Casper와 CSP를 이용하여 RADIUS 프로토콜을 수행동작을 명세하고, 모델 체킹 도구인 FDR을 사용하여 RADIUS 프로토콜의 안전성을 분석하고자 하였다.

  • PDF

Research of model accumulation to solve SAT Hard instance (Model Accumulation 을 이용한 SAT Hard Instance의 해결 방법 연구)

  • 장민경;최진영;곽희환
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.505-507
    • /
    • 2003
  • SAT 문제는 하드웨어/소프트웨어 검증과 모델 체킹 등 다양한 분야에서 유용하게 사용되고 있으나 복잡도가 NP-complete 라는 어려움을 가지고 있다. 다양한 알고리즘과 휴리스틱, 도구들이 개발되었지만 그럼에도 불구하고 해결할 수 없는 hard instance 들이 존재한다. 이 논문에서는 그러한 hard instance를 해결하기 위한 방법의 하나로 model accumulation을 제안한다.

  • PDF

Model Checking of Concurrent Object-Oriented Systems (병렬 객체지향 시스템의 검증)

  • Cho, Seung-Mo;Kim, Young-Gon;Bae, Doo-Hwan;Byun, Sung-Won;Kim, Sang-Taek
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.1
    • /
    • pp.1-12
    • /
    • 2000
  • Model checking is a formal verification technique which checks the consistency between a requirement specification and a behavior model of the system by explorating the state space of the model. We apply model checking to the formal verification of the concurrent object-oriented system, using an existing model checker SPIN which has been successful in verifying concurrent systems. First, we propose an Actor-based modeling language, called APromela, by extending the modeling language Promela which is a modeling language supported in SPIN. APromela supports not only all the primitives of Promela, but additional primitives needed to model concurrent object-oriented systems, such as class definition, object instantiation, message send, and synchronization.Second, we provide translation rules for mapping APromela's such modeling primitives to Promela's. As an application of APromela, we suggest a verification method for UML models. By giving an example of specification, translation, and verification, we also demonstrate the applicability of our proposed approach, and discuss the limitations and further research issues.

  • PDF

Knowledge and Strategic Ability based on Strategic Constraints (전략적 제한에 기초한 지식 및 전략 시스템)

  • Koo, Ja-Rok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.33-40
    • /
    • 2009
  • We study Interpreted Systems, ATL, and ATEL to capture the notion of time, knowledge, and strategy which are important in the analysis of multi-agent systems and propose strategic constraints based on subgame perfect Nash equilibrium of game theory as one of the solutions for the issues of ATEL which an agent can access the current state of the whole system when making up his strategy even when he should be uncertain about the state, and no explicit representation of actions in ATEL models makes some natural situations harder to model. Also, we present strategic constraints-based Interpreted Systems for model checking of multi-agent systems.

Verification of the Carlsen BCY Protocol Using Model Checking (모델체킹을 이용한 Carlsen BCY프로토콜 검증)

  • 김현석;전철욱;김일곤;최진영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.289-291
    • /
    • 2004
  • 인터넷을 통한 통신의 안전성을 확보하기 위해서는 전송될 정보를 암호화해야 한다 따라서 통신의 주체간에는 공통적인 키의 공유와 상대방의 신원 확인을 위한 절차가 필요하다 정형검증기법은 이러한 네트워크상에서 통신의 안전성을 확보하기 위한 수단으로 사용되며, 본 논문에서는 무선환경기반 보안 프로토콜인 Carlsen BCY프로토콜을 모델 체커인 FDR을 사용하여 검증하였다.

  • PDF

An Applicability Study of Action-Benefit-Cost Model and Statistical Model Checking for System of Systems Goal Achievement Verification (시스템 오브 시스템즈 수준의 목표 달성 검증을 위한 행동-이익-비용 모델과 통계적 모델 체킹 적용 연구)

  • Kim, Junho;Shin, Donghwan;Bae, Doo-Hwan
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.4
    • /
    • pp.256-261
    • /
    • 2017
  • The notion of System of Systems (SoS), which is composed by many independent systems (i.e., Constituent Systems, CS), has emerged in various domains including social infrastructure. It is widely expected that complex requirements, which cannot be achieved in each CS-level, will be achieved in an SoS-level. While verification of SoS-level goal achievement is one of the most important problems, concrete case studies on SoS modeling and verification are still rare. In this paper, we focus on the fact that each CS performs an action for its own purpose by its own decision-making mechanism. We propose a novel Action-Benefit-Cost (ABC) SoS model which caters to the independent decision-making mechanisms of CSs. Using an abstract SoS example, this proposal provides a case study for the modeling and quantitative verification of the ABC SoS model.

Systematic Evaluation of Fault Trees using Real-Time Model Checker (실시간 모델 체커를 이용한 풀트 트리의 체계적 검증)

  • 지은경;차성덕;손한성;유준범;구서룡;성풍현
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.12
    • /
    • pp.860-872
    • /
    • 2002
  • Fault tree analysis is the most widely used saftly analysis technique in industry. However, the analysis is often applied manually, and there is no systematic and automated approach available to validate the analysis result. In this paper, we demonstrate that a real-time model checker UPPAAL is useful in formally specifying the required behavior of safety-critical software and to validate the accuracy of manually constructed fault trees. Functional requirements for emergency shutdown software for a nuclear power plant, named Wolsung SDS2, are used as an example. Fault trees were initially developed by a group of graduate students who possess detailed knowledge of Wolsung SDS2 and are familiar with safety analysis techniques including fault tree analysis. Functional requirements were manually translated in timed automata format accepted by UPPAAL, and the model checking was applied using property specifications to evaluate the correctness of the fault trees. Our application demonstrated that UPPAAL was able to detect subtle flaws or ambiguities present in fault trees. Therefore, we conclude that the proposed approach is useful in augmenting fault tree analysis.

Safety Analysis of the RFID Authentication Protocol using Model Checking (모델 체킹을 이용한 RFID 인증 프로토콜 안전성 분석)

  • Oh Jung-Hyun;Choi Jin-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.999-1002
    • /
    • 2006
  • RFID 시스템의 보안적 취약점을 보안하기 위해 많은 프로토콜이 제안되었지만, 아직까지 완벽하게 보안성과 경제성을 모두 만족시키지 못하였다. 본 논문에서는 RFID 시스템의 보안적 취약점을 보안하기 위해 제안된 보안 프로토콜의 안전성 만족 여부를 정형기법을 이용하여 검증을 실시하고, 발전방향에 대해 제시하였다.

  • PDF