Nonetheless, translating SysML-Sec diagrams to
ProVerif still includes limitations. They depend either
on ProVerif limitations or on the new translation pro-
cess. We present them here as a warning to potential
users and as leads for potential future work.
Loops. Even though our current translation of loops
enables proof of most properties — proof of strong
authentication would sometimes fail — and gives
sound results for others, the introduction of nonces
for chaining basic blocks may in some cases cause
ProVerif to produce a cannot be proved result. We
made this compromise since loops were likely to re-
duce the completeness of the proof. A possible im-
provement would be to enable the user to manually
provide hints to help ProVerif in its proof for diagrams
containing loops.
Arithmetic. When translating the SysML-Sec dia-
gram to ProVerif we discard any arithmetic-related
operation that is performed in actions or guards. In
fact, ProVerif has no representation for arithmetic, re-
garding operations or even types like numbers. Tak-
ing these operations into account would require us to
deeply modify the ProVerif proof engine, such as in-
terfacing it with a theory solver for instance. This is
not part of our work in the foreseeable future.
Time. Even though timers are taken into account
by our current translation, SysML after clauses are
not yet handled. However, features were added to
ProVerif in order to enable modeling of phases which
could possibly be used to translate these clauses to
some extent.
Other future work include a mathematical proof of
equivalence and a design-to-executable code process
preserving security properties.
REFERENCES
Ali, Y., El-Kassas, S., and Mahmoud, M. (2009). A rig-
orous methodology for security architecture modeling
and verification. In Proceedings of the 42nd Hawaii
International Conference on System Sciences, volume
978-0-7695-3450-3/09. IEEE.
Apvrille, A. (2015). Geek usages for your fitbit flex tracker
hack.lu, luxemburg, october 2015. Slides at fra-
madrive.org/index.php/s/Wk6nxAKMpVTdQl4.
Apvrille, L. (2003). TTool. ttool.telecom-paristech.fr.
Apvrille, L. and Roudier, Y. (2015). SysML-Sec: A model
driven approach for designing safe and secure sys-
tems. In 3rd International Conference on Model-
Driven Engineering and Software Development, Spe-
cial session on Security and Privacy in Model Based
Engineering, France. SCITEPRESS Digital Library.
Assolini, F. (2012). The Tale of One Thousand and One
DSL Modems, kaspersky lab.
Bengtsson, J. and Yi., W. (2004). Timed automata: Seman-
tics, algorithms and tools. In Lecture Notes on Con-
currency and Petri Nets, pages 87–124. W. Reisig and
G. Rozenberg (eds.), LNCS 3098, Springer-Verlag.
Blanchet, B. (2009). Automatic Verification of Correspon-
dences for Security Protocols. Journal of Computer
Security, 17(4):363–434.
Drouineaud, M., Bortin, M., Torrini, P., and Sohr, K.
(2004). A first step towards formal verification of se-
curity policy properties for rbac. In QSIC’04, pages
60–67, Washington, DC, USA.
Durgin, N., Lincoln, P., Mitchell, J., and Scedrov, A. (2004).
Multiset rewriting and the complexity of bounded se-
curity protocols. J. Comput. Secur., 12(2):247–311.
Hoppe, T., Kiltz, S., and Dittmann, J. (2011). Security
Threats to Automotive CAN Networks - Practical Ex-
amples and Selected Short-Term Countermeasures.
Rel. Eng. & Sys. Safety, 96(1):11–25.
ICS-CERT (2015). Hospira lifecare pca infusion sys-
tem vulnerabilities, advisory (icsa-15-125-01b).
https://ics-cert.us-cert.gov/advisories/ICSA-15-125-
01B.
J
¨
urjens, J. (2007). Developing secure embedded systems:
Pitfalls and how to avoid them. In 29th International
Conference on Software Engineering (ICSE 2007),
pages 182–183. ACM.
Kelling, E., Friedewald, M., Leimbach, T., Menzel, M.,
S
¨
ager, P., Seudi
´
e, H., and Weyl, B. (2009). Specifica-
tion and Evaluation of e-Security Relevant Use cases.
Technical Report Deliverable D2.1, EVITA Project.
Ma
˜
na, A. and Pujol, G. (2008). Towards formal specifi-
cation of abstract security properties. In The Third In-
ternational Conference on Availability, Reliability and
Security, volume 0-7695-3102-4/08. IEEE.
Maslennikov, D. (2010). Russian cybercriminals on the
move: profiting from mobile malware. In The 20th
Virus Bulletin Internation Conference, pages 84–89,
Vancouver, Canada.
Maynor, D. (2006). Scada security and terrorism:
We’re not crying wolf! In Invited presentation
at BlackHat BH 2006. Presentation available at:
https://www.blackhat.com/presentations/bh-federal-
06/BH-Fed-06-Maynor-Graham-up.pdf, USA.
Shen, G., Li, X., Feng, R., Xu, G., Hu, J., and Feng, Z.
(2014). An extended uml method for the verifica-
tion of security protocols. In Engineering of Com-
plex Computer Systems (ICECCS), 2014 19th Inter-
national Conference on, pages 19–28.
Toussaint, M. J. (1993). A New Method for Analyzing the
Security of Cryptographic Protocols. In Journal on
Selected Areas in Communications, volume 11, No. 5.
IEEE.
Trcek, D. and Blazic, B. J. (1995). Formal language for
security services base modelling and analysis. In El-
sevier Science Journal, Computer Communications,
volume Vol. 18, No. 12. Elsevier Science.
MODELSWARD 2016 - 4th International Conference on Model-Driven Engineering and Software Development
338