Abstract
Complex reactive systems such as 5G cellular networks must have flexible configuration options to fit different deployment scenarios. However, not every possible configuration combination is risk-free. Some of them may lead to availability issues or even security vulnerabilities. Asking the system engineers to check each configuration via model checking for every deployment or re-configuration is impractical if not impossible. In this paper, we propose the concept of secure configuration space and develop a symbolic model checking algorithm, INCISE, to compute a large configuration space for a given reactive system. Such a space will be characterized by a logical condition (e.g., a Boolean formula). A system engineer can check any candidate configuration against the condition with a single SAT query to know whether it is secure. The target properties could be general safety and liveness properties. The algorithm enjoys the same benefits including efficiency and expressiveness as modern symbolic model checkers. We demonstrate the algorithm’s performance on industrial benchmarks and leverage it to address security issues in cellular network protocols.
Original language | English (US) |
---|---|
Title of host publication | Information Security - 27th International Conference, ISC 2024, Proceedings |
Editors | Nicky Mouha, Nick Nikiforakis |
Publisher | Springer Science and Business Media Deutschland GmbH |
Pages | 140-160 |
Number of pages | 21 |
ISBN (Print) | 9783031757631 |
DOIs | |
State | Published - 2025 |
Event | 27th Information Security Conference, ISC 2024 - Arlington, United States Duration: Oct 23 2024 → Oct 25 2024 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 15258 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 27th Information Security Conference, ISC 2024 |
---|---|
Country/Territory | United States |
City | Arlington |
Period | 10/23/24 → 10/25/24 |
Funding
This work was partially supported by the National Science Foundation (NSF) under grants 2113704, 2148177, and 2229454. Any opinions, recommendations, or findings are those of the authors and do not reflect the views of Alibaba Cloud.
Keywords
- Formal analysis
- Network system and protocol
- Secure configuration space
- Symbolic model checking
ASJC Scopus subject areas
- Theoretical Computer Science
- General Computer Science