-
Solutions
-
Researching, developing, and transitioning advances in separation architectures, model-based system engineering, and mathematical analysis.
- Safety & Security AnalysisAnalyze system models for gaps in safety and security compliance, and generate documentation to support certification requirements.
- Real-time Operating System SchedulingProvide end-to-end, system-wide schedulabilty analysis, and generate real-time operating system (RTOS) schedules and configuration information
- Embedded System Tradespace AnalysisSupport least-commitment design strategies by continuously evaluating embedded system design alternatives against diverse requirements.
- Isolation TechnologyEnable virtual security enclaves within a single physical server
-
-
Initiatives
-
What’s next: Innovative research examining hard problems of national importance.
- Weird MachinesAnticipating vulnerabilities related to computer systems that employ artificial intelligence
- Education InnovationDelivering game-based education to adolescents and young adults
- Automated Behavior AnalysisDetecting vulnerabilities in embedded systems using timed automata (VOLTA)
- Code GenerationAutomating the integration of cyber-resilient components in complex systems
-
- About Us
Using Composition and Refinement to Support Security Architecture Trade-Off Analysis
Using Composition and Refinement to Support Security Architecture Trade-Off Analysis
Abstract
This paper demonstrates that composition and refinement techniques are a promising solution for performing rigorous, security architecture trade-off analysis. Such analysis typically occurs in one of two forms: comparing two architectures for implementation and determining the impact of change to an implemented architecture. Composition and refinement techniques reduce the overhead of such analysis significantly over traditional formal methods by facilitating specification and proof reuse and by providing powerful reasoning tools. In this paper, we propose an approach for applying composition and refinement techniques to trade-off analysis. Our approach relies on a formal composition and refinement framework, which is not described here. We describe the approach and apply it to a simple example. We conclude with lessons learned and future work.
Year of Publication
1999
Source
22nd National Information Systems Security Conference