Property Guided Secure Configuration Space Search

You Li*, Kaiyu Hou, Yunqi He, Yan Chen, Hai Zhou

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Complex reactive systems such as 5G cellular networks must have flexible configuration options to fit different deployment scenarios. However, not every possible configuration combination is risk-free. Some of them may lead to availability issues or even security vulnerabilities. Asking the system engineers to check each configuration via model checking for every deployment or re-configuration is impractical if not impossible. In this paper, we propose the concept of secure configuration space and develop a symbolic model checking algorithm, INCISE, to compute a large configuration space for a given reactive system. Such a space will be characterized by a logical condition (e.g., a Boolean formula). A system engineer can check any candidate configuration against the condition with a single SAT query to know whether it is secure. The target properties could be general safety and liveness properties. The algorithm enjoys the same benefits including efficiency and expressiveness as modern symbolic model checkers. We demonstrate the algorithm’s performance on industrial benchmarks and leverage it to address security issues in cellular network protocols.

Original languageEnglish (US)
Title of host publicationInformation Security - 27th International Conference, ISC 2024, Proceedings
EditorsNicky Mouha, Nick Nikiforakis
PublisherSpringer Science and Business Media Deutschland GmbH
Pages140-160
Number of pages21
ISBN (Print)9783031757631
DOIs
StatePublished - 2025
Event27th Information Security Conference, ISC 2024 - Arlington, United States
Duration: Oct 23 2024Oct 25 2024

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume15258 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference27th Information Security Conference, ISC 2024
Country/TerritoryUnited States
CityArlington
Period10/23/2410/25/24

Funding

This work was partially supported by the National Science Foundation (NSF) under grants 2113704, 2148177, and 2229454. Any opinions, recommendations, or findings are those of the authors and do not reflect the views of Alibaba Cloud.

Keywords

  • Formal analysis
  • Network system and protocol
  • Secure configuration space
  • Symbolic model checking

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Property Guided Secure Configuration Space Search'. Together they form a unique fingerprint.

Cite this