Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

Mils-based information flow control in the avionic domain

A case study on compositional architecture and verification
 
: Müller, Kevin; Paulitsch, Michael; Schwarz, Reinhard; Tverdyshev, Sergey; Blasum, Holger

:

Institute of Electrical and Electronics Engineers -IEEE-; American Institute of Aeronautics and Astronautics -AIAA-, Washington/D.C.:
IEEE/AIAA 31st Digital Avionics Systems Conference, DASC 2012. Vol.4 : Williamsburg, Virginia, USA, 14 - 18 October 2012
Piscataway/NJ: IEEE, 2012
ISBN: 978-1-4673-1699-6
ISBN: 978-1-4673-1700-9
S.3377-3399
Digital Avionics Systems Conference (DASC) <31, 2012, Williamsburg/Va.>
Englisch
Konferenzbeitrag
Fraunhofer IESE ()

Abstract
Software architectures in the aerospace domain are becoming more and more integrated and interconnected for functional and architectural reasons (Integrated Modular Avionics, IMA), which exacerbates potential security problems of avionic software. As a consequence, security considerations are gaining importance for the general "airworthiness" of modern aircrafts, and proper security assurance requires increasing effort. In this paper, we report on-going work in the SeSaM research project. We propose to leverage modularity as a key to obtain more secure software and higher assurance of this claimed security with reasonable effort. Using Multiple Independent Levels of Security (MILS), we present a case study on how an application can be systematically designed, secured, and proven secure by adopting a composite evaluation approach reflecting the modular system architecture. More specifically, we employ a separation kernel as the foundation for a security-critical application, and we investigate how a security evaluation can be achieved systematically and with reduced effort if we evaluate underlying kernel and dependent application independently before joining these partial results to obtain an overall evaluation verdict. Thus, we illustrate how a compositional approach may ease security design and security assurance of IMA architectures.

: http://publica.fraunhofer.de/dokumente/N-234193.html