Abstract
Static system configuration provides the advantage for the attackers to discover the vulnerabilities of the system and launch attacks. Moving Target Defense (MTD) can break this asymmetry for the defenders by mutating certain configuration parameters proactively and at the same time maintaining the run-time correctness and operational integrity. MTD is essentially distributed by nature since the processes or actions in MTD are executed in an interleaved manner. For any distributed system, it is important to verify the correctness and integrity, since they may be jeopardized by design errors or run time inconsistencies. In this work we present a framework for formal verification of MTD techniques. We describe MTD techniques with formal ontology and model the system behaviors with timed automata, and verify the correctness, liveness, fairness and deadlock-free properties of the system. We use Random Host Mutation (RHM) as the case study or MTD formal verification. Our experimentation validates the feasibility and scalability of the formal verification framework.
| Original language | English |
|---|---|
| Title of host publication | Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019 |
| Publisher | Association for Computing Machinery |
| ISBN (Electronic) | 9781450371476 |
| DOIs | |
| State | Published - 1 Apr 2019 |
| Externally published | Yes |
| Event | 6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019 - Nashville, United States Duration: 1 Apr 2019 → 3 Apr 2019 |
Publication series
| Name | ACM International Conference Proceeding Series |
|---|
Conference
| Conference | 6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019 |
|---|---|
| Country/Territory | United States |
| City | Nashville |
| Period | 1/04/19 → 3/04/19 |
Bibliographical note
Publisher Copyright:© 2019 Copyright held by the owner/author(s).
ASJC Scopus subject areas
- Software
- Human-Computer Interaction
- Computer Vision and Pattern Recognition
- Computer Networks and Communications
Fingerprint
Dive into the research topics of 'A formal verification of mutation-based moving target defense'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver