About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Conference paper

Automated Verification of Virtualized Infrastructures

In Ccsw '11 Proceedings of the 3rd Acm Workshop on Cloud Computing Security Workshop — 2011, pp. 47-58
From

IBM Zurich Research Laboratory1

University of Newcastle upon Tyne2

Department of Informatics and Mathematical Modeling, Technical University of Denmark3

Language-Based Technology, Department of Informatics and Mathematical Modeling, Technical University of Denmark4

Virtualized infrastructures and clouds present new challenges for security analysis and formal verification: they are complex environments that continuously change their shape, and that give rise to non-trivial security goals such as isolation and failure resilience requirements. We present a platform that connects declarative and expressive description languages with state-of-the art verification methods.

The languages integrate homogeneously descriptions of virtualized infrastructures, their transformations, their desired goals, and evaluation strategies. The different verification tools range from model checking to theorem proving; this allows us to exploit the complementary strengths of methods, and also to understand how to best represent the analysis problems in different contexts.

We consider first the static case where the topology of the virtual infrastructure is fixed and demonstrate that our platform allows for the declarative specification of a large class of properties. Even though tools that are specialized to checking particular properties perform better than our generic approach, we show with a real-world case study that our approach is practically feasible.

We finally consider also the dynamic case where the intruder can actively change the topology (by migrating machines). The combination of a complex topology and changes to it by an intruder is a problem that lies beyond the scope of previous analysis tools and to which we can give first positive verification results.

Language: English
Publisher: ACM
Year: 2011
Pages: 47-58
Proceedings: ACM workshop on Cloud computing security workshop
ISBN: 1450310044 and 9781450310048
Types: Conference paper
DOI: 10.1145/2046660.2046672
ORCIDs: Mödersheim, Sebastian Alexander

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis