A formal verification of mutation-based moving target defense

  • Muhammad Abdul Basit Ur Rahim
  • , Qi Duan
  • , Ehab Al-Shaer

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Static system configuration provides the advantage for the attackers to discover the vulnerabilities of the system and launch attacks. Moving Target Defense (MTD) can break this asymmetry for the defenders by mutating certain configuration parameters proactively and at the same time maintaining the run-time correctness and operational integrity. MTD is essentially distributed by nature since the processes or actions in MTD are executed in an interleaved manner. For any distributed system, it is important to verify the correctness and integrity, since they may be jeopardized by design errors or run time inconsistencies. In this work we present a framework for formal verification of MTD techniques. We describe MTD techniques with formal ontology and model the system behaviors with timed automata, and verify the correctness, liveness, fairness and deadlock-free properties of the system. We use Random Host Mutation (RHM) as the case study or MTD formal verification. Our experimentation validates the feasibility and scalability of the formal verification framework.

Original languageEnglish
Title of host publicationProceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019
PublisherAssociation for Computing Machinery
ISBN (Electronic)9781450371476
DOIs
StatePublished - 1 Apr 2019
Externally publishedYes
Event6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019 - Nashville, United States
Duration: 1 Apr 20193 Apr 2019

Publication series

NameACM International Conference Proceeding Series

Conference

Conference6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019
Country/TerritoryUnited States
CityNashville
Period1/04/193/04/19

Bibliographical note

Publisher Copyright:
© 2019 Copyright held by the owner/author(s).

ASJC Scopus subject areas

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'A formal verification of mutation-based moving target defense'. Together they form a unique fingerprint.

Cite this