D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal...

79
Project Number 318772 D4.3 Integration of formal evidence and expression in MILS assurance case Version 1.3 1 October 2015 Final Public Distribution Fondazione Bruno Kessler, University of York Project Partners: Fondazione Bruno Kessler, fortiss, Frequentis, Inria, LynuxWorks, The Open Group, RWTH Aachen University, TTTech, Université Joseph Fourier, University of York Every effort has been made to ensure that all statements and information contained herein are accurate, however the D-MILS Project Partners accept no liability for any error or omission in the same. © 2015 Copyright in this document remains vested in the D-MILS Project Partners.

Transcript of D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal...

Page 1: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

Project Number 318772

D4.3 Integration of formal evidence and expression inMILS assurance case

Version 1.31 October 2015

Final

Public Distribution

Fondazione Bruno Kessler, University of York

Project Partners: Fondazione Bruno Kessler, fortiss, Frequentis, Inria, LynuxWorks, The OpenGroup, RWTH Aachen University, TTTech, Université Joseph Fourier, Universityof York

Every effort has been made to ensure that all statements and information contained herein are accurate, howeverthe D-MILS Project Partners accept no liability for any error or omission in the same.

© 2015 Copyright in this document remains vested in the D-MILS Project Partners.

Page 2: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

Project Partner Contact Information

Fondazione Bruno Kessler fortissAlessandro Cimatti Harald RuessVia Sommarive 18 Guerickestrasse 2538123 Trento, Italy 80805 Munich, GermanyTel: +39 0461 314320 Tel: +49 89 36035 22 0Fax: +39 0461 314591 Fax: +49 89 36035 22 50E-mail: [email protected] E-mail: [email protected]

Frequentis LynuxWorksWolfgang Kampichler Yuri BakalovInnovationsstrasse 1 Rue Pierre Curie 381100 Vienna, Austria 78210 Saint-Cyr-l’Ecole, FranceTel: +43 664 60 850 2775 Tel: +33 1 30 85 06 00Fax: +43 1 811 50 77 2775 Fax: +33 1 30 85 06 06E-mail: [email protected] E-mail: [email protected]

RWTH Aachen University The Open GroupJoost-Pieter Katoen Scott HansenAhornstrasse 55 Avenue du Parc de Woluwe 56D-52074 Aachen, Germany 1160 Brussels, BelgiumTel: +49 241 8021200 Tel: +32 2 675 1136Fax: +49 241 8022217 Fax: +32 2 894 5845E-mail: [email protected] E-mail: [email protected]

TTTech Université Joseph FourierWilfried Steiner Saddek BensalemSchonbrunner Strasse 7 Avenue de Vignate 21040 Vienna, Austria 38610 Gieres, FranceTel: +43 1 5853434 983 Tel: +33 4 56 52 03 71Fax: +43 1 585 65 38 5090 Fax: +33 4 56 03 44E-mail: [email protected] E-mail: [email protected]

University of York InriaTim Kelly Axel LegayDeramore Lane Inria - Campus de BeaulieuYork YO10 5GH, United Kingdom 35042 Rennes, FranceTel: +44 1904 325477 Tel: +33 2 99 84 73 15Fax: +44 7976 889 545 Fax: +33 2 99 84 71 71E-mail: [email protected] E-mail: [email protected]

Page ii Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 3: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

Contents

1 Introduction 2

2 Patterns 3

2.1 System Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

2.1.1 Pattern description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

2.1.2 Pattern instantiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

2.1.3 Module Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

2.2 Composition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

2.2.1 Pattern description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

2.2.2 Pattern instantiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

2.2.3 Module Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

2.3 Trusted Software Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

2.3.1 Pattern description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

2.3.2 Pattern instantiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

2.3.3 Module Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

2.4 Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

2.4.1 Pattern description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

2.4.2 Pattern instantiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

2.4.3 Module Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

2.5 D-MILS Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

2.5.1 Pattern description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

2.5.2 Pattern instantiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

2.5.3 Module Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

2.6 Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

2.6.1 Pattern description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

2.6.2 Pattern instantiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

2.6.3 Module Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

2.7 Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

2.7.1 Pattern description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

2.7.2 Pattern instantiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

2.7.3 Module Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

2.8 Person . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page iii

Page 4: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

2.8.1 Pattern description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

2.8.2 Pattern instantiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

2.8.3 Module Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

2.9 Organisation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

2.9.1 Pattern description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

2.9.2 Pattern instantiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

2.9.3 Module Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43

2.10 Artefact . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

2.10.1 Pattern description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

2.10.2 Pattern instantiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

2.10.3 Module Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

2.11 Technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

2.11.1 Pattern description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

2.11.2 Pattern instantiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

2.11.3 Module Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

2.12 TTEthernet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50

2.12.1 Pattern description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50

2.12.2 Pattern instantiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52

2.12.3 Module Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

3 Automated Instantiation 54

3.1 GSN Pattern Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54

3.2 System Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54

3.3 Weaving Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55

3.4 MBAC program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56

3.5 GSN Argument Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57

4 Starlight example 58

4.1 GSN Pattern Models for Starlight . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

4.2 Starlight System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

4.3 Weaving Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

4.4 Starlight Assurance Argument Models . . . . . . . . . . . . . . . . . . . . . . . . . 59

4.4.1 Starlight System Properties Assurance Argument Model . . . . . . . . . . . 59

4.4.2 Starlight Composition Assurance Argument Model . . . . . . . . . . . . . . 64

Page iv Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 5: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

A Starlight system properties GSNML model 65

B Starlight System Properties Module GSN Structure 67

C Starlight Composition GSNML model 68

D Starlight Composition Module GSN Structure 71

Acronyms 72

References 73

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page v

Page 6: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

Document Control

Version Status Date0.1 Document started 22 January 20150.2 Started description of patterns 29 January 20150.3 Added description of implementation

and platform patterns6 February 2015

0.4 Added description of composition pat-tern

10 February 2015

0.5 First draft introduction 13 February 20150.6 Added description of tool support 17 February 20151.0 First release of deliverable 27 February 20151.1 Added Starlight Example 12 March 20151.2 Added description of Process argument

patterns. Small modifications to otherargument patterns to link to these pro-cess arguments.

26 August 2015

1.3 Added description of TTEthernet argu-ment pattern.

1 October 2015

Page vi Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 7: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

Executive Summary

This document describes how to integrate formal verification evidence, including evidence obtainedwith compositional reasoning, as part of the assurance case. In addition, it presents an approachto more formally underpinning the argument module interfaces with assume/guarantee reasoning.This provides a more compelling assurance case, increasing confidence in both the argument and thetechniques used. It also improves the ability to re-use argument modules, thus meeting overall aimsfor distributed MILS.

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 1

Page 8: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

1 Introduction

The D-MILS approach provides an end-to-end support to the modeling, verification, and deploymentof a high-assurance system. The approach is driven by the architecture which is modeled in the MILS-AADL language, it is used to perform a compositional verification deriving system-level propertiesfrom the components properties, and whose implementation is ensured by the configuration compilerand the platform. Therefore, the assurance case of a D-MILS system follows this process, detailinghow the properties of the system are derived from the components, which techniques and tools havebeen used in the verification, how the platform configuration is generated, and which guarantees areprovided by the platform.

This report describes exactly how assurance cases can be created for D-MILS systems following thisprocess and using information from the MILS-AADL model of the system and formal verificationactivities. This is achieved firstly through specifying a set of assurance case patterns in section 2 thatdescribe the required structure of the argument and evidence that must be provided in the assurancecase generated for any D-MILS system. The assurance case patterns are specified using the GSNpattern notation, as described in [1]. The pattern specification includes details of how to instantiatethe patterns for a target system by identifying the source of the required instantiation informationfrom system models.

Section 3 describes how the assurance case for a D-MILS system may be created, in large part,automatically by using the D-MILS model-based assurance case tool developed for this project. Thetool creates an assurance case argument automatically using the D-MILS assurance case patternsand the relevant system models. We describe in section 4 an example of automatically creating anassurance case argument for the starlight system.

Page 2 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 9: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

2 Patterns

This section describes the assurance case patterns for a D-MILS system. A pattern is provided foreach of the constituent assurance case modules that will make up the overall D-MILS assurance case.The relationship between the different modules is illustrated in figure 1.

SystemPropertiesArgument

CompositionArgument

ImplementationArgument

D-MILS PlatformComponentArgument

Trusted SoftwareComponentArgument

D-MILS PlatformArgument

n

n

Process

n

no. of trusted softwarecomponents

no. ofprocesses

no. of platformcomponents

Figure 1: The modules of a D-MILS assurance case

For each D-MILS assurance case pattern we present the following information:

• A general description including the following items:

• Structure - The pattern structure using GSN.• Intent - What the pattern should be used for.• Participants - further information regarding key elements of the pattern• Applicability - Under what circumstances the pattern may and may not be applied• Consequences - Description of what remains to be addressed in the assurance case once

this pattern is applied• Related Patterns

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 3

Page 10: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

• Pattern Instantiation - How the patterns may be instantiated using information regarding thetarget system

• Module Interface - The assurance guarantees made by arguments using this pattern and the de-pendencies on claims from other assurance case modules required to support those guarantees.The module interface also specifies the context and assumptions within which the assuranceguarantees are made.

2.1 System Properties

2.1.1 Pattern description

StructureThe pattern structure is shown in figure 2.

IntentThis pattern should be used to create arguments that a D-MILS system enforces its required proper-ties. The pattern may be used for any properties of interest for the D-MILS system assurance caseincluding, but not limited to, security, safety, functional and real-time properties.

Participants

Goal: sysProps The required properties to be enforced are the informal properties defined for thesystem, often resulting from hazard analysis or security analysis of the system. These informalproperties should be identified using existing established requirements capturing techniques.

Con: sysDescr The system is defined by its MILS-AADL model.

Ass:sysProps The defined system properties must be complete and correct with respect to thethreats, vulnerabilities and hazards of the system. It is not within the scope of the D-MILSassurance case to argue about these high-level properties and therefore an assumption is madethat this is the case. It is necessary to demonstrate elsewhere that the system properties cor-rectly reflect the system analysis.

Goal: propEnforced A claim of this type is made for each of the system properties.

Con: formalProps Formal properties are defined that correspond to each of the informal systemproperties

Goal: propAdd For each formal property relating to the informal property under consideration, aclaim of this type is created.

Goal: propSuff It must be demonstrated that the formal properties address the informal property.

Goal: propSat This claim, that the MILS-AADL model satisfies the formal property, is supportedby the composition assurance case module (see the composition pattern, section 2.2).

Goal: propsSat The verification proves that the formal properties are satisfied by the MILS-AADLmodel. It must be demonstrated that the implementation of the system supports this, by demon-strating that the MILS-AADL model is correctly implemented and that the assumed propertiesof the components and platform are enforced.

Page 4 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 11: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

Goal: sysProps

{D-MILS System}required properties areenforced

Con: sysProps

required properties:{D-MILS systemproperties}

Con: sysDescr

{D-MILS System}:defined by {MILS-AADL system model}

Strat: propSat

Argument over therequired properties of thecomponents and theplatform

Goal: propsSat

{formal property} is addressedthrough the realisation of theMILS-AADL system model

Con: enviroProps_Composition

assumed environmental properties:{assumed environmentalproperties}

Composition

Strat: compVerifArgument over eachformal system propertyrelating to {D-MILS systemproperty}

Goal: propAdd

{formal property} is satisfiedthrough the realisation of theMILS-AADL system model

Goal: platProp_D-MILS Platform

D-MILS platform guaranteesrequired properties

D-MILS Platform

Con:platformProps_Composition

properties of D-MILS platform:{assumed platform properties}

Composition

Strat: sysProps

Argument over eachsafety or securityproperty

Goal: propEnforced

{D-MILS systemproperty} is enforced

no. of {D-MILS systemproperties}

no. of {formal properties}

Con: formalProps

formal system propertiesrelating to {D-MILSsystem property}: {formalproperties}

Goal:sysImp _Implementation

The MILS-AADL model is faithfullyimplemented

Implementation

no. of {trusted softwarecomponents}

Goal: SwComponents

Trusted software componentscorrectly implement the MILS-AADL implementaionspecification

Strat: swComponents

Argument over eachtrusted softwarecomponent

Con: components_Composition

trusted software components:{trusted softwarecomponents}

Composition

Con: component

implementationspecification: {componentMILS-AADL specification}

Goal: envAss

All environmentassumptions are met

Strat: envAss

Argument over eachassumed environmentalproperty

Goal: sysProp

{assumed environmentalproperty} is met

no. of {assumed environmentalproperties}

A

Ass:sysProps

The defined required propertiesare complete and correct w.r.t.System threats, vulnerabilitiesand hazards

Goal: propSuff

The formal properties aresufficient to adddress thedefined D-MILS systemproperties

Goal: propSat _Composition

{formal property} is satisfied in theMILS-AADL system model

Composition

Goal: sWcompProp _Trusted SoftwareComponent

{trusted software component} correctlyimplements the MILS-AADL implmenetationspecification

Trusted Software Component

Figure 2: D-MILS system properties assurance case argument pattern

Goal: SwComponents The verification demonstrates that the implementation specification for thesoftware components, defined by the MILS-AADL, satisfies the formal requirement of thecomponent. It must therefore be assured that the software component correctly implementsthat specification.

Con: components Trusted software components are those components for which formal require-ments have been specified.

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 5

Page 12: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

Goal: sWcompProp A claim of this type is made for each of the trusted software components re-lated to the system property. This claim, that the trusted software component correctly imple-ments its MILS-AADL specification, is supported by the trusted software component modulefor that component (see the trusted software component pattern, section 2.3).

Goal: platProp The verification of the system properties assumes that the D-MILS platform itselfhas certain properties. It must be demonstrated that these properties are guaranteed by theplatform. The assumed properties of the D-MILS platform include standard D-MILS features,but could also include additional properties if these have been assumed by the verification. Thisclaim is supported by the D-MILS platform assurance case module (see the D-MILS platformpattern, section 2.5).

Goal: envAss The formal system property may be defined by a contract that includes assumptionsabout the environment to the system. Where such assumptions are present it is necessary toassure that the assumptions are met.

Goal: sysProp A claim of this type is made for each of the environmental assumptions. An argumentand evidence must be provided to demonstrate that the assumption holds.

Goal: sysImp It has to be demonstrated that the MILS-AADL model, upon which the formal prop-erties were proved, is faithfully implemented. This claim is supported by the implementationassurance case module (see the implementation pattern, section 2.4).

ApplicabilityThis pattern is applicable to any system that meets the requirements of a D-MILS system and hasbeen developed and analysed using the D-MILS approach.

ConsequencesOnce this pattern is instantiated, the following claims will be created that require support:

Goal: propSat A claim of this type will be created for each formal property. Each claim will forma public goal of the composition assurance case module. The way in which these claims aresupported is described by the composition pattern (section 2.2).

Goal: propSuff Argument and evidence must be provided to demonstrate that the formal propertiesaddress the informal property. Depending upon the notation and tools used for the formalanalysis, a number of possible strategies may exist, such as running queries on the formalspecification to check the reachability of states, or considering execution traces. To facilitatethe support of this claim it is important to capture design justifications at the time at which theformal requirement specification is produced.

Goal: sWcompProp A claim of this type will be created for each trusted software component. Eachclaim will form a public goal of a separate trusted software component assurance case module.The way in which these claims are supported is described by the trusted software componentpattern (section 2.3).

Goal: platProp This claim will form a public goal of the D-MILS platform assurance case module.The way in which this claim is supported is described by the D-MILS platform pattern (section2.5).

Page 6 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 13: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

Goal: sysProp A claim of this type will be created for each assumption of the formal system property.Argument and evidence must be provided to demonstrate that the assumption is met by thesystem’s environment. The way in which this is assured will vary depending upon the precisenature of the assumption.

Goal: sysImp This claim will form a public goal of the implementation assurance case module. Theway in which this claim is supported is described by the implementation pattern (section 2.4).

Related Patterns

The argument created from this pattern requires support from arguments created using the Composi-tion, Trusted Software Component, D-MILS Platform and Implementation argument patterns.

2.1.2 Pattern instantiation

When instantiating the pattern the following information regarding the target system is required.The source describes the suggested source for the required information, see section 3 for details onautomatically instantiating the argument pattern with the required information.

Roles

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 7

Page 14: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

Role Description SourceD-MILS System Name of the system system name in MILS-AADL fileMILS-AADLsystem model

Reference to the MILS-AADLmodel

Manual

D-MILS systemproperties

informal system properties Requirements document ordatabase

D-MILS systemproperty

a member of the set of D-MILSsystem properties

As for D-MILS systemproperties

formalproperties

formal system properties relating toa D-MILS system property

Guarantee condition of contract de-fined for system in MILS-AADLspecification

formal property a member of the set of formalproperties

As for formal properties

trustedsoftwarecomponents

subcomponents of the system forwhich a formal requirement relat-ing to the system property has beenspecified

subcomponent name in MILS-AADL specification

trustedsoftwarecomponent

a member of the set of trustedsoftware components

As for trusted softwarecomponents

componentMILS-AADLspecification

the MILS-AADL specificationfor a trusted softwarecomponent

The subject implementation

assumed D-MILSplatformproperties

Additional assumptions made aboutthe properties of the D-MILS plat-form over and above the genericplatform properties described in theDMILS platform pattern

Unknown

assumedenvironmentalproperties

the assumptions made as part of theformal property

Assume condition of contract de-fined for system in MILS-AADLspecification

assumedenvironmentalproperty

a member of the set ofassumed environmentalproperties

As for assumedenvironmentalproperties

Choices

None

Optional

Goal: envAss and its supporting argument are required only when the formal system property con-tains assumptions.

Page 8 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 15: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

2.1.3 Module Interface

This pattern forms a self-contained assurance case module that is intended to be used as part of alarger assurance case. This interface defines the assurance claims that this module can guarantee(to the assurance case), the dependencies that the module has on other modules (these dependenciesmust be assured for the guaranteed claim to be supported), and context and assumptions within whosescope the dependencies must be assured.

Guarantees

• {D-MILS System} required properties are enforced

Dependencies

• {formal property} is satisfied in the MILS-AADL system model• {trusted software component} correctly implements the MILS-AADL implementation specifi-

cation• D-MILS platform guarantees required properties• The MILS-AADL model is faithfully implemented

Context

• D-MILS System• required properties• formal system properties relating to D-MILS system property• trusted software components• implementation specification• properties of D-MILS platform• assumed environmental properties

Assumptions

• The defined required properties are complete and correct with respect to System threats, vul-nerabilities and hazards

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 9

Page 16: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

2.2 Composition

2.2.1 Pattern description

StructureThe pattern structure is shown in figure 3.

IntentThis pattern should be used to create arguments that formally defined properties of a D-MILS aresatisfied by a MILS-AADL model of that system.

Participants

Goal: propSat It is necessary to demonstrate that each of the formal properties specified in theMILS-AADL model is satisfied. This is done using a formal verification approach.

Goal: verifResults The results of the formal verification are used to demonstrate that the formalproperty is satisfied. The type of formal technique used to verify the property will depend onthe property itself.

Con: components As part of the verification of the formal properties, formal requirements may bespecified for components of the system that refine the formal system property. Components forwhich a requirement has been specified are referred to as trusted software components. Thetrusted software components are referred to from elsewhere in the D-MILS assurance case.

Con: enviroProps As part of the verification of the formal properties, assumptions may be maderegarding properties of the environment of the D-MILS system. The assumed environmentalproperties are referred to from elsewhere in the D-MILS assurance case.

Con: platformProps As part of the verification of the formal properties, it may be necessary tomake additional assumptions made about the properties of the D-MILS platform over andabove the generic platform properties described in the DMILS platform pattern. The assumedplatform properties are referred to from elsewhere in the D-MILS assurance case.

Goal: formalConf As well as presenting the results of the formal verification, it is also necessaryto demonstrate that there is sufficient confidence in the correctness of those formal verificationresults.

Goal: verification The verification technique applied will be selected based upon the type of prop-erty to be verified. It must be demonstrated that the process of verification using the techniquegenerates trustworthy results.

Goal: activityTrust A claim is made that the activity of performing the verification using the appliedtechnique is sufficiently trustworthy. This claim is supported by an assurance case module forthe verification process, which is an instantiation of the generic process argument pattern (seethe process pattern, section 2.6. Where a process model of the verification activity is provided,the appropriate process model is selected according to the name of the technique used (asspecified in the MILS-AADL model of the system).

Goal: errorModel It must be demonstrated that the MILS-AADL error model is complete and cor-rect.

Page 10 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 17: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

Co

n:c

om

po

nen

ts

tru

sted

soft

war

eco

mp

on

ents

:{tr

ust

edso

ftw

are

com

po

nen

ts}

Co

n:e

nvi

roP

rop

s

assu

med

envi

ron

men

tal

pro

per

ties

:{as

sum

eden

viro

nm

enta

lp

rop

erti

es}

Go

al:

veri

fRes

ult

s

Re

sults

offo

rma

lverifica

tion

dem

onst

rate

{fo

rmal

pro

pert

y}is

satis

fied

Go

al:f

orm

alC

on

f

Ther

eis

suff

icie

nt

con

fid

ence

inth

efo

rmal

veri

fica

tio

nre

sult

s

So

l:v

eri

fResu

lts

{form

alv

erific

ation

resu

ltsfo

r{f

orm

al

pro

pert

y}}

Go

al:

form

alV

eri

f

Form

alv

erific

atio

np

rove

sth

at

the

MIL

S-

AA

DL

mod

el

satis

fies

{form

alp

ropert

y}

Go

al:f

orm

alV

eri

fErr

or

Form

alve

rifi

cati

on

pro

ves

that

the

exte

nd

edM

ILS-

AA

DL

erro

rm

od

elsa

tisf

ies

{fo

rmal

pro

per

ty}

Go

al:e

rro

rMo

del

MIL

S-A

AD

Ler

ror

mo

del

of

{sys

tem

}is

com

ple

tean

dco

rrec

t

Co

n:e

rro

rMo

del

{MIL

S-A

AD

Ler

ror

mo

del

}

Wh

ere

{pro

per

tyty

pe}

=sa

fety

Co

n:p

latf

orm

Pro

ps

pro

per

ties

of

D-M

ILS

pla

tfo

rm:{

assu

med

pla

tfo

rmp

rop

erti

es}

Go

al:

pro

pS

at

{form

alp

rop

ert

y}is

satis

fied

inth

eM

ILS

-A

AD

Lsy

stem

model

Go

al:v

eri

fica

tio

n

Ver

ific

atio

nu

sin

g{t

ech

niq

ue}

give

str

ust

wo

rth

yre

sult

s {tec

hn

iqu

e}

pro

cess

{err

or

mo

del

}p

roce

ss

Go

al:a

ctiv

ityT

rust

_Pro

cess

{Act

ivit

y}is

suff

icie

ntl

ytr

ust

wo

rth

y

Pro

cess

Go

al:a

ctiv

ityT

rust

_Pro

cess

{Act

ivit

y}is

suff

icie

ntl

ytr

ust

wo

rth

y

Pro

cess

Figure 3: D-MILS composition assurance case argument pattern

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 11

Page 18: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

Goal: activityTrust A claim is made that the activity of generating the error model is sufficientlytrustworthy. This claim is supported by an assurance case module for the error model pro-cess, which is an instantiation of the generic process argument pattern (see the process pattern,section 2.6.

Applicability

This pattern is applicable to any D-MILS system that uses a formal verification approach to proveproperties of the system.

Consequences

Once this pattern is instantiated, the following claims will be created that require support:

Goal: activityTrust Two instances of this goal will be created, one for the verification activity, andone for the error model process. These claims will form public goals of the process assurancecase module. The way in which this claim is supported is described by the process pattern(section 2.6).

Related Patterns

The argument created from this pattern supports the argument created using the D-MILS systemproperties pattern and requires support from arguments created using the process argument pattern.

2.2.2 Pattern instantiation

When instantiating the pattern the following information regarding the target system is required.The source describes the suggested source for the required information, see section 3 for details onautomatically instantiating the argument pattern with the required information.

Roles

Page 12 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 19: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

Role Description Sourceformal property formal system property relating to a

D-MILS system propertyGuarantee condition of contract de-fined for system in MILS-AADLspecification

trustedsoftwarecomponents

subcomponents of the system forwhich a formal requirement relat-ing to the system property has beenspecified

subcomponent name in MILS-AADL specification

assumedenvironmentalproperties

the assumptions made as part of theformal property

Assume condition of contract de-fined for system in MILS-AADLspecification

assumedplatformproperties

properties assumed as part of thesystem property verification

Unknown

formalverificationresultsfor {formalproperty}

reference to the results of the formalverification of the formal property

Manual

technique the name of the formal techniqueused for the verification of the for-mal property

technique name defined for the re-quirement in MILS-AADL specifi-cation

property type the type of the formal property the type defined for the referencerequirement for the formal require-ment in the MILS-AADL specifica-tion

Choices

{technique} is used to determine which process model to use when instantiating Goal: activityTrust.

Optional

Goal: formalVerifError and its supporting evidence are required only when {property type} to beverified is a safety property.

2.2.3 Module Interface

This pattern forms a self-contained assurance case module that is intended to be used as part of alarger assurance case. This interface defines the assurance claims that this module can guarantee(to the assurance case), the dependencies that the module has on other modules (these dependenciesmust be assured for the guaranteed claim to be supported), and context and assumptions within whosescope the dependencies must be assured.

Guarantees

• {formal property} is satisfied in the MILS-AADL system model

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 13

Page 20: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

Dependencies

• {Activity} is sufficiently trustworthy

Context

• assumed environmental properties• assumed platform properties• trusted software components• MILS-AADL error model

AssumptionsNone

Page 14 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 21: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

2.3 Trusted Software Components

2.3.1 Pattern description

StructureThe pattern structure is shown in figure 4.

Goal: sWcompProp

{trusted software component}correctly implements the MILS-AADL implmenetation specification

Con: component

implementationspecification: {componentMILS-AADL specification}

Figure 4: Trusted software components assurance case argument pattern

IntentThis pattern should be used by developers of trusted software components for a D-MILS systems tocreate arguments that the software component correctly implements the MILS-AADL specification.It is the responsibility of the developing organisation to provide argument and evidence appropriateto the domain of application, certification regime and required integrity. This would be expected totake account of relevant software assurance standards and guidance.

Participants

Goal: sWcompProp The verification of properties for the D-MILS system relies upon trusted soft-ware components correctly implementing their specification as defined in the MILS-AADLspecification.

Con: component The specification for the component is defined by the MILS-AADL componentimplementation.

ApplicabilityThis pattern is applicable to any software component for which a formal requirement is specified aspart of the MILS-AADL specification.

ConsequencesOnce this pattern is instantiated, the following claims will be created that require support:

Goal: sWcompProp It must be demonstrated using evidence generated during the development, anal-ysis and verification of the software component that the specification is correctly implemented.

Related PatternsThe argument created from this pattern can provide support to arguments created using the D-MILSsystem properties argument pattern.

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 15

Page 22: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

2.3.2 Pattern instantiation

When instantiating the pattern the following information regarding the target system is required.The source describes the suggested source for the required information, see section 3 for details onautomatically instantiating the argument pattern with the required information.

RolesRole Description Sourcetrustedsoftwarecomponent

a member of the set of trustedsoftware components

As for trusted softwarecomponents

trustedsoftwarecomponents

subcomponents of the system forwhich a formal requirement relat-ing to the system property has beenspecified

subcomponent name in MILS-AADL specification

componentMILS-AADLspecification

the MILS-AADL specificationfor a trusted softwarecomponent

The subject implementation

ChoicesNone

OptionalNone

2.3.3 Module Interface

This pattern forms a self-contained assurance case module that is intended to be used as part of alarger assurance case. This interface defines the assurance claims that this module can guarantee(to the assurance case), the dependencies that the module has on other modules (these dependenciesmust be assured for the guaranteed claim to be supported), and context and assumptions within whosescope the dependencies must be assured.

Guarantees

• trusted software component correctly implements the MILS-AADL implmenetation specifica-tion

DependenciesNone

Context

• implementation specification

AssumptionsNone

Page 16 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 23: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

2.4 Implementation

2.4.1 Pattern description

StructureThe pattern structure is shown in figure 5.

IntentThis pattern should be used to create arguments that a MILS-AADL model is faithfully implementedby a D-MILS system.

Participants

Goal: impConfig The verified MILS-AADL model is implemented via the creation of a configu-ration description that is used to configure the D-MILS system. This includes the requiredconfiguration and scheduling of the subjects and nodes, and the network connecting the nodes.

Con: config The configuration is described by a MILS Configuration Normal Form (MNCF) file.

Goal: wellFormed It is necessary to demonstrate that the generated configuration is correct withrespect to the MILS-AADL specification and satisfies all the constraints (the system model,the platform model and the additional defined constraints). This can be demonstrated by con-sidering the process by which the configuration is generated, and also verifying the consistencyof the resulting configuration.

Goal: configGen The correctness of the configuration is demonstrated through consideration of thecompilation process used to generate the configuration.

Goal: activityTrust A claim is made that the configuration compilation activity is sufficiently trust-worthy. This claim is supported by an assurance case module for the compilation process,which is an instantiation of the generic process argument pattern (see the process pattern, sec-tion 2.6).

Goal: configConsist It is necessary to demonstrate that the different views of the configuration,corresponding to the different types of platform component, are consistent with each other.This is done by identifying the objects that are present in multiple views of the configurationand checking that the representation of those objects is consistent between the views. For aD-MILS system the objects present in multiple views include remotely addressable objects(RAOs)and virtual links.

Goal: platform Once a perfected configuration is chosen, that chosen configuration must then becorrectly realised by the D-MILS platform itself. The configuration is realised by the con-stituent components of the D-MILS platform through the use of target-specific configurationscreated for each platform component.

Goal: targetConfigs It must be shown that the target specific configuration for each of the con-stituent platform components is syntactically and semantically equivalent to the chosen con-figuration. This claim is a designated as a public goal, allowing it to be referenced from otherassurance case modules. This can be a particularly useful guarantee for other modules thatmake use of the target-specific configurations.

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 17

Page 24: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

Goal: activityTrust The generation of the target-specific configurations is done by a process thatuses an adapter specific to the target component. It is necessary to demonstrate that this adap-tion process is trustworthy. This claim is supported by an assurance case module for the targetadaption process, which is an instantiation of the generic process argument pattern (see theprocess pattern, section 2.6).

Goal: configImp It must be demonstrated that the target specific configurations are correctly inter-preted and implemented by each of the platform components.

Goal: compConfig This claim, that the platform component correctly implements its configuration,is supported by the {platform component} module for the relevant component.

Applicability

This pattern is applicable to any D-MILS system that uses the D-MILS platform configuration com-piler to generate the configuration for the system.

Consequences

Once this pattern is instantiated, the following claims will be created that require support:

Goal: activityTrust Two instances of this goal will be created, one for the configuration compilationactivity, and one for target adaption. These claims will form public goals of the process assur-ance case module. The way in which this claim is supported is described by the process pattern(section 2.6).

Goal: compConfig A claim of this type will be created for each platform component. Each claimwill form a public goal of the relevant {platform component} assurance case module.

Related Patterns

The argument created from this pattern supports the argument created using the D-MILS systemproperties pattern and requires support from arguments created using the {technique} tool argumentpattern.

2.4.2 Pattern instantiation

When instantiating the pattern the following information regarding the target system is required.The source describes the suggested source for the required information, see section 3 for details onautomatically instantiating the argument pattern with the required information.

Roles

Page 18 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 25: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

Role Description SourceMILSconfiguration-normal-form(MCNF) configfile

Reference to the configuration file Manual

system model Reference to the Prolog systemmodel

Manual

platformcomponents

constituent components of the D-MILS platform

platform description

platformcomponent

a member of the set of platformcomponents

As for platform components

types ofplatformcomponents

The different types of platformcomponent for which configurationviews are created

Manual

componentconfig file

Reference to the target-specificconfiguration file for theplatform component

Manual

Choices

None

Optional

None

2.4.3 Module Interface

This pattern forms a self-contained assurance case module that is intended to be used as part of alarger assurance case. This interface defines the assurance claims that this module can guarantee(to the assurance case), the dependencies that the module has on other modules (these dependenciesmust be assured for the guaranteed claim to be supported), and context and assumptions within whosescope the dependencies must be assured.

Guarantees

• The MILS-AADL model is faithfully implemented• The target specific configurations are syntactically and semantically correct with respect to the

configuration

Dependencies

• {Activity} is sufficiently trustworthy• {platform component} configuration files are correctly interpreted and implemented in the

{platform component}

Context

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 19

Page 26: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

• constraints: system model, platform description, additional constraints• configuration• target platform components• objects in multiple configurations• types of platform component• component configuration files

AssumptionsNone

Page 20 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 27: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance caseG

oa

l:sy

sIm

p

The

MIL

S-A

AD

Lm

od

elis

fait

hfu

llyim

ple

me

nte

d

Stra

t:sy

sim

p

Arg

um

en

to

ver

the

gen

era

ted

con

figu

rati

on

Go

al:

imp

Co

nfi

g

MIL

S-A

AD

Lm

od

elis

fait

hfu

llyim

ple

me

nte

db

yth

ege

ne

rate

dco

nfi

gura

tio

n

Co

n:

con

fig

con

figu

rato

in:

{MC

NF

con

fig

file

}

Go

al:

we

llFo

rmed

The

gen

erat

edco

nfi

gura

tio

nis

corr

ect

wit

hre

spec

tto

the

MIL

S-A

AD

Lm

od

ela

nd

sati

sfie

sal

lco

nst

rain

tsG

oa

l:p

latf

orm

The

con

figu

rati

on

isre

alis

edb

yth

eD

-MIL

Sp

latf

orm

Go

al:

targ

etC

on

figs

The

targ

etsp

eci

fic

con

figu

rati

on

sar

esy

nta

ctic

ally

and

sem

anti

cally

corr

ect

wit

hre

spe

ctto

the

con

figu

rati

on

Co

n:

targ

etC

on

figs

com

po

ne

nt

con

figu

rati

on

file

:{c

om

po

ne

nt

con

fig

file

}

Stra

t:ta

rge

tVe

rif

Arg

um

ent

ove

re

ach

targ

et

pla

tfo

rmco

mp

on

ent

Co

n:

pla

tfo

rmC

om

p

targ

et

pla

tfo

rmco

mp

on

en

ts:

{pla

tfo

rmco

mp

on

en

ts}

Go

al:

com

pC

on

fig

targ

et

spe

cifi

c{p

latf

orm

com

po

ne

nt}

con

figu

rati

on

file

issy

nta

ctic

ally

and

sem

anti

cally

corr

ect

w.r

.tth

eco

nfi

gura

tio

n

no

.of

{pla

tfo

rmco

mp

on

en

ts}

Stra

t:p

latf

orm

Arg

um

en

to

ver

the

targ

etsp

ecif

icco

nfi

gura

tio

ns

Co

n:

con

stra

ints

con

stra

ints

:{sy

ste

mm

od

el}

,{p

latf

orm

de

scri

pti

on

},{a

dd

itio

nal

con

stra

ints

}

Go

al:

con

figI

mp

The

targ

etsp

ecif

icco

nfi

gura

tio

ns

are

real

ised

thro

ugh

the

imp

lem

en

tati

on

of

the

D-M

ILS

pla

tfo

rmco

mp

on

en

ts

no

.of

{pla

tfo

rmco

mp

on

en

ts}

Go

al:

com

pC

on

fig

_{p

latf

orm

com

po

ne

nt}

{pla

tfo

rmco

mp

on

en

t}co

nfi

gura

tio

nfi

les

are

corr

ect

lyin

terp

rete

dan

dim

ple

me

nte

din

the

{pla

tfo

rmco

mp

on

ent}

{pla

tfo

rmco

mp

on

en

t}

Stra

t:co

nfi

gIm

p

Arg

um

en

to

ver

eac

hta

rget

pla

tfo

rmco

mp

on

en

t

Go

al:

con

figC

on

sist

Th

eco

nfi

gura

tio

nis

con

sist

en

tb

etw

een

vie

ws

Stra

t:co

nfi

gCo

nsi

st

Arg

um

en

to

ver

ob

ject

sin

mu

ltip

leco

nfi

gura

tio

nvi

ew

s

Go

al:

RA

Oco

nsi

st

RA

Os

are

con

sist

ent

be

twee

nvi

ew

s

Go

al:

VLc

on

sist

Vir

tual

links

are

con

sist

en

tb

etw

een

vie

ws

So

l:R

AO

nam

es

Revie

wo

fR

AO

nam

es

acr

oss

vie

ws

Go

al:

RA

On

od

e

For

eac

hn

od

e,t

he

sam

eR

AO

nam

esar

ed

ecl

are

din

all

vie

ws

con

tain

ing

RA

Os

Co

n:

ob

ject

s

ob

ject

sin

mu

ltip

leco

nfi

gura

tio

ns:

RA

Os,

virt

ual

links

Go

al:

VLm

nsT

TE

The

cou

ple

dvi

rtu

allin

ksid

en

tifi

edin

the

MN

Svi

ewar

eco

nsi

ste

nt

wit

hth

elin

ksd

efin

edin

the

TTE

vie

w

So

l:V

Ls

Re

vie

wo

fV

Ls

acro

ss

vie

ws

Co

n:

view

s

vie

ws:

{typ

es

of

pla

tfo

rmco

mp

on

en

t}

Stra

t:w

ell

Form

ed

Arg

um

en

to

ver

the

pro

cess

of

gen

era

tin

gth

eco

nfi

gura

tio

nan

dth

eve

rifi

cati

on

of

the

resu

lt

Go

al:

con

figG

en

The

gen

erat

ion

of

the

con

figu

rati

on

ensu

res

that

the

con

figu

rati

on

isco

rre

ct

Stra

t:co

mp

Co

nfi

gs

Arg

um

en

to

ver

the

pro

cess

of

gen

erat

ing

the

targ

etsp

ecif

icco

nfi

gura

tio

ns

an

dth

eve

rifi

cati

on

of

the

resu

lt

Stra

t:co

nfi

gGe

n

Arg

um

en

to

ver

the

con

figu

rati

on

cop

mp

ilati

on

pro

cess

{co

nfi

gura

tio

nco

mp

ilati

on

}p

roce

ss

{tar

get

adap

tio

n}

pro

cess

for

{pla

tfo

rmco

mp

on

ent}

Go

al:

act

ivit

yTru

st_

Pro

cess

{Act

ivit

y}is

suff

icie

ntl

ytr

ust

wo

rth

y

Pro

cess

Go

al:

act

ivit

yTru

st_

Pro

cess

{Act

ivit

y}is

suff

icie

ntl

ytr

ust

wo

rth

y

Pro

cess

Figure 5: D-MILS implementation assurance case argument pattern

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 21

Page 28: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

2.5 D-MILS Platform

2.5.1 Pattern description

StructureThe pattern structure is shown in figure 6.

IntentThis pattern should be used to create arguments that a D-MILS platform guarantees the requiredproperties.

Participants

Goal: platProp In order to be able to guarantee properties of a D-MILS system, it is necessary tobe able to rely on the D-MILS platform providing certain properties. The required platformproperties are those properties that are assumed during the compositional verification of the D-MILS system properties. These platform properties will always include guarantees regardinginter- and intra-nodal interference.

Goal: interComms One of the platform properties that must be guaranteed is that communicationbetween nodes over the network occurs only as defined in MILS-AADL model of the system.

Goal: network Inter-nodal communication is controlled by ensuring that network communicationonly occurs in accordance with Global Information Flow Policy (GIFP). The GIFP is a target-specific configuration file. This is assured through the operation of the MILS NetworkingSystem (MNS) and the TTEthernet network.

Goal: MNS This claim, that the MNS will only permit communications that conform to the GIFP,is supported by the MILS networking system assurance case module.

Goal:TTEgtee This claim, that the TTEthernet network can guarantee that only those connectionsthat have been specified between nodes are possible, is supported by the TTEthernet assurancecase module.

Goal: GIFPcorrect Since the GIFP is being used to defined permitted communication betweennodes, it must be demonstrated that the GIFP is correct with respect to the MILS-AADL model.This is demonstrated using a claim (Goal: targetConfigs) provided in the implementation mod-ule (see the implementaion pattern, section 2.4).

Goal: interComp To ensure the security and integrity of the D-MILS system, it must be demon-strated that the inter-nodal communication guarantees cannot be compromised either mali-ciously or through error. This is assured by considering the vulnerabilities of the network anddemonstrating that those vulnerabilities are mitigated.

Goal: noNetworkAccess The first vulnerability that requires mitigation is access by subjects otherthan the MNS to the network. If other subjects access the network then they could send andreceive messages that aren’t in accordance with the GIFP. This is mitigated through assuringthat only the MILS Network Subsystem (MNS) can control the TTEthernet card. Withoutcontrol of the TTEthernet card it is not possible for a subject to communicate over the network.This is guaranteed through a number of design features.

Page 22 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 29: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance caseG

oa

l:p

latP

rop

D-M

ILS

pla

tfo

rmgu

aran

tees

req

uir

edp

rop

ert

ies

Co

n:

pla

tfo

rmP

rop

s_C

om

po

siti

on

pro

per

ties

of

D-M

ILS

pla

tfo

rm:

{ass

um

ed

pla

tfo

rmp

rop

ert

ies}

Co

mp

osi

tio

n

Stra

t:p

latP

rop

Arg

um

ent

ove

rea

chre

qu

ire

dp

rop

ert

y

Go

al:M

NSc

on

tro

l

On

lyth

eM

NS

can

con

tro

lth

eTT

Eth

ern

etca

rdu

sed

for

inte

r-n

od

eco

mm

un

icat

ion

s

Go

al:T

TEca

rd

The

TTEt

her

net

card

isd

ire

ctly

ass

ign

ed

too

nly

the

MN

S

Go

al:n

oN

etw

ork

Acc

ess

Acc

iden

talo

rm

alic

iou

sac

cess

by

sub

ject

so

ther

than

the

MN

Sto

the

net

wor

kis

pre

ven

ted

Go

al:M

NSd

isti

nct

MN

Sru

ns

asa

dis

tin

ctsu

bje

ctth

atis

iso

late

dfr

om

oth

ersu

bje

cts

run

nin

go

nth

esa

me

no

de.

Go

al:

inte

rCo

mm

s

inte

r-n

od

alco

mm

un

icat

ion

occ

urs

on

lyas

def

ine

din

MIL

S-A

AD

Lm

od

elG

oal

:In

tra

Co

mm

s

Intr

a-n

od

alin

terf

ere

nce

occ

urs

on

lyas

def

ined

inM

ILS-

AA

DL

mo

del

Go

al:M

NSS

K

All

inte

ract

ion

so

fM

NS

wit

hit

scl

ien

tsu

bje

cts

on

the

sam

en

od

ear

eim

ple

men

ted

usi

ng

the

SK

Go

al:

SK_S

ep

era

tio

nK

ern

el

The

sep

era

tio

nke

rnel

(SK

)en

forc

es

acce

ssto

sha

red

me

mo

ryis

on

lyac

cord

ing

toit

sco

nfi

gura

tio

n

Sep

erat

ion

Ke

rnel

Go

al:T

TEgt

ee

_TT

Eth

ern

et

TTE

ther

net

net

wor

kgu

aran

tees

that

on

lyth

esp

ecif

ied

con

nec

tio

ns

bet

wee

nn

od

es

are

po

ssib

le.

TTEt

her

net

Go

al:

pla

tfo

rmG

tee

s

D-M

ILS

pla

tfo

rmgu

ara

nte

es{a

ssu

med

pro

per

ty}

no

.of

add

itio

nal

{ass

um

ed

pla

tfo

rmp

rop

erti

es}

Str

at:i

nte

rCo

mp

Arg

um

ent

ove

rm

itig

atio

no

fid

en

tifi

edvu

lner

abili

tie

s

Go

al:

inte

rCo

mp

Per

mit

ted

inte

r-n

od

alco

mm

un

icat

ion

can

no

tb

eco

mp

rom

ised

Go

al:r

eso

urc

es

MN

Sca

nn

ot

be

de

nie

dsu

ffic

ien

tre

sou

rce

sto

fun

ctio

n

Go

al:

MN

Sdis

tin

ct

MN

Sfu

nct

ion

alit

yis

imp

lem

en

ted

asa

dis

tin

ctsu

bje

ctw

ith

its

ow

nm

emo

ryan

dre

al-t

ime

pri

ori

ty

Go

al:u

serL

ev

elA

pp

MN

Sis

the

on

lyu

ser-

leve

lap

plic

atio

n,s

od

oes

no

tco

mp

ete

for

reso

urc

es

Go

al:

flo

ws

The

syn

thet

icin

terr

up

tsh

ave

flo

ws

def

ine

do

nly

toth

eM

NS

fro

mth

ecl

ien

t(f

or

inco

min

gd

atag

ram

s)an

dfr

om

the

MN

Sto

the

clie

nt

(fo

ro

utg

oin

gd

atag

ram

s).

Go

al:n

um

be

rs

Syn

thet

icin

terr

up

tsco

min

gfr

om

dis

tin

ctcl

ien

tsh

ave

dis

tin

ctn

um

ber

s,so

the

MN

Sca

nea

sily

dis

tin

guis

ham

on

gth

ecl

ien

tsu

po

nre

ceip

to

fth

ein

terr

up

ts.

Go

al:

fixe

dQ

Afi

xed

size

qu

eue

ensu

res

furt

her

syn

thet

icin

terr

up

tsw

illfa

ilw

hen

the

qu

eue

iso

verr

un

Go

al:

arb

itra

ry

No

flo

wis

de

fin

edth

atal

low

san

arb

itra

rysy

nth

eti

cin

terr

up

tto

be

sen

tto

the

MN

Ssu

bje

ct

Go

al:

dat

a

Dat

ase

nt

ove

rth

en

etw

ork

can

no

ta

lter

MN

Sb

ehav

iou

r

Go

al:

dat

aCo

nt

The

con

ten

tso

fse

nt

or

reci

eved

dat

agra

ms

isn

eve

rex

amin

ed

by

the

MN

S

Go

al:I

nte

rru

pts

All

syn

thet

icin

terr

up

tsar

ese

nt

and

reci

eve

db

yth

eM

NS

Go

al:n

oSu

bje

ctA

cce

ss

Acc

ide

nta

lor

mal

icio

us

acce

ssto

sub

ject

sb

ycl

ien

tso

ne

xte

rnal

no

de

sis

pre

ven

ted

Go

al:i

mp

ers

on

ate

No

clie

nt

can

imp

ers

on

ate

an

oth

er

Go

al:

flo

od

ing

Syn

thet

icin

teru

pt

flo

od

ing

ism

itig

ated

Co

n:G

IFP

con

fFile

s

Glo

bal

Info

rmat

ion

Flo

wP

olic

y:{G

IFP

con

figu

rati

on

file

s}

Go

al:n

etw

ork

Net

wo

rkco

mm

un

ica

tio

no

ccu

rsin

acco

rdan

cew

ith

Glo

bal

Info

rmat

ion

Flo

wP

olic

y

Stra

t:n

etw

ork

Arg

um

en

to

ver

the

op

erat

ion

of

the

MN

San

dTT

Eth

ern

et

Go

al:M

NS

_MIL

SN

etw

ork

ing

Syst

em

Th

eM

ILS

Net

wor

kin

gSy

stem

s(M

NS)

per

mit

sn

etw

ork

com

mu

nic

atio

no

nly

asd

efin

edin

GIF

P

MIL

SN

etw

ork

ing

Syst

em

Go

al:G

IFP

corr

ect

GIF

Pis

corr

ect

wit

hre

spec

tto

MIL

S-A

AD

Lm

od

el

Go

al:

targ

etC

on

fig

s_

Imp

lem

en

tati

on

The

targ

etsp

ecif

icco

nfi

gura

tio

ns

are

syn

tact

ical

lyan

dse

man

tica

llyco

rre

ctw

ith

resp

ect

toth

eco

nfi

gura

tio

n

Imp

lem

en

tati

on

Go

al:

vulC

om

p

Th

eid

enti

fied

vuln

erab

iliti

esa

reco

mp

lete

Stra

t:In

traC

om

ms

Arg

um

ent

ove

rea

chn

od

e

Co

n:n

od

es

no

des

:{n

od

es}

no

.of

{no

des

}

Go

al:n

od

e

Inte

rfer

ence

bet

wee

nsu

bje

cts

wit

hin

{no

de

}o

ccu

rso

nly

asd

efin

ed

inSK

con

figu

rati

on

Co

n:S

Kco

nfi

g

SKco

nfi

gura

tio

n:

{SK

con

figu

rati

on

file

}

Go

al:S

Kco

nfi

gCo

rre

ct

SKco

nfi

gfi

leis

corr

ect

wit

hre

spe

ctto

MIL

S-A

AD

Lm

od

el

Go

al:

targ

etC

on

figs

_Im

ple

me

nta

tio

n

The

targ

etsp

eci

fic

con

figu

rati

on

sar

esy

nta

ctic

ally

and

sem

an

tica

llyco

rrec

tw

ith

resp

ect

toth

eco

nfi

gura

tio

n

Imp

lem

enta

tio

n

So

l:L

SA

rch

{Lyn

xS

ecu

reso

ftw

are

arc

hitectu

rede

sign

}

So

l:L

SA

rch

{Lyn

xS

ecu

reso

ftw

are

arc

hitectu

rede

sig

n}

So

l:L

SA

rch

{Lyn

xS

ecu

reso

ftw

are

arc

hite

ctu

red

esi

gn}

So

l:L

SA

rch

{Lyn

xS

ecu

reso

ftw

are

arc

hite

ctu

red

esi

gn}

So

l:L

SA

rch

{Lyn

xS

ecu

reso

ftw

are

arc

hite

ctu

red

esi

gn}

Figure 6: D-MILS platform assurance case argument pattern

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 23

Page 30: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

Goal: noSubjectAccess The second vulnerability that requires mitigation is clients on other nodesgaining access to a node’s subjects to which they are not permitted. This is mitigated in twoways. Firstly through assuring that all interrupts arriving at a node over the network are handledby the MNS (which is guaranteed to enforce the GIFP). Secondly by assuring that a clientcan’t impersonate another client, thus being given improper access to a subject. This is againguaranteed through a number of design features.

Goal: resources The third vulnerability to address is that the MNS could be compromised throughbeing denied sufficient resources to operate. Once again there are features of the platformdesign that address this vulnerability.

Goal: data The final vulnerability is that there is a possibility that MNS behaviour could be alteredby malicious or erroneous data that is sent over the network. It is assured that this cannot occurby ensuring that the MNS never examines the contents of the datagrams sent on the network.

Goal: vulComp It must be demonstrated that there is confidence that there are no more vulnera-bilities other than those already addressed in the argument. This could be assured throughconsideration of vulnerability analysis performed on the platform.

Goal: intraComms Another platform property that must be guaranteed is that interference within anode only occurs as defined in the MILS-AADL model. An argument is made over each of thenodes in the system.

Goal: node For each node it must be assured that the interference between the subjects runningon that node only occurs as defined by the configuration. This is enforced using the node’sseparation kernel.

Goal: SK This claim, that the separation kernel ensures that memory access only occurs as definedby the configuration, is supported by the separation kernel module for the SK of the relevantnode.

Goal: SKconfigCorrect Since the SK configuration file is being used to define the permitted in-terference between subjects, it must be demonstrated that the SK config file for the node iscorrect with respect to the MILS-AADL model. This is demonstrated using a claim (Goal:targetConfigs) provided in the implementation module (see the implementaion pattern, section2.4).

Sol: platformGtees Where additional platform properties have been assumed for the verification ofthe system properties (in additional to the guarantees regarding inter- and intra-nodal interfer-ence), it must be demonstrated that these properties are met by the D-MILS platform.

Sol: LSArch Evidence for the presence of many required design features can be provided by in-formation contained in the design of the Lynx Secure software architecture. For each of therequired features, the solution should be instantiated with reference to the relevant specificdesign information.

Applicability

This pattern is applicable to any D-MILS system.

Consequences

Page 24 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 31: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

Once this pattern is instantiated, the following claims will be created that require support:

Goal: MNS This claim must be supported by argument and evidence in the MILS networking systemassurance case module.

Goal: TTEgtee This claim must be supported by argument and evidence in the TTEthernet assurancecase module.

Goal: targetConfigs This claim will form a public goal of the implementation assurance case module.The way in which this claim is supported is described by the implementation pattern (section2.4).

Goal: SK This claim must be supported by argument and evidence in the MILS networking systemassurance case module.

Goal: vulComp Argument and evidence must be provided concerning the completeness of the net-work vulnerabilities.

Goal: platformGtees A claim of this type will be created for each additional required platform guar-antee. Each claim will require argument and evidence that the assumed property is guaranteedby the D-MILS platform.

Related Patterns

The argument created from this pattern supports the argument created using the D-MILS systemproperties pattern and requires support from arguments created using the implementation argumentpattern.

2.5.2 Pattern instantiation

When instantiating the pattern the following information regarding the target system is required.The source describes the suggested source for the required information, see section 3 for details onautomatically instantiating the argument pattern with the required information.

Roles

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 25

Page 32: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

Role Description SourceGIFPconfigurationfile

Reference to the configuration file Manual

Lynx Securesoftwarearchitecturedesign

Reference to design features Unknown

nodes The constituent nodes of the D-MILS system

platform description

node a member of the set of nodes As for nodesassumedplatformproperties

properties assumed as part of thesystem property verification

Unknown

assumedproperty

a member of the set of assumedplatform properties

As for assumed platformproperties

Choices

None

Optional

None

2.5.3 Module Interface

This pattern forms a self-contained assurance case module that is intended to be used as part of alarger assurance case. This interface defines the assurance claims that this module can guarantee(to the assurance case), the dependencies that the module has on other modules (these dependenciesmust be assured for the guaranteed claim to be supported), and context and assumptions within whosescope the dependencies must be assured.

Guarantees

• D-MILS platform guarantees required properties

Dependencies

• The MILS Networking Systems (MNS) permits network communication only as defined inGIFP

• TTEthernet network guarantees that only the specified connections between nodes are possible.• The target specific configurations are syntactically and semantically correct with respect to the

configuration• The separation kernel enforces access to shared memory is only according to its configuration

Context

Page 26 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 33: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

• properties of D-MILS platform• Global Information Flow Policy• nodes• separation kernel configuration

AssumptionsNone

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 27

Page 34: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

2.6 Process

2.6.1 Pattern description

Structure

The pattern structure is shown in figure 7.

Intent

This pattern is used to create an argument for any process used during the development and analy-sis of a D-MILS system. The trustworthiness of the processes adopted is an important part of theassurance case. Process arguments are used as part of the argument made within other modules ofthe D-MILS assurance case. This pattern is instantiated for the process relevant to the argument atthat point. Where process models have been created, these process models can be used to automat-ically instantiate the process argument pattern. Processes are considered to be activities, which canbe composed of further sub-activities. All activities (and sub-activities) may have any number ofparticipants. Participants may be classified as tools, people or organisations. Activities may requireand produce any number of artefacts. Activities are undertaken using a defined technique.

Participants

Goal: activityTrust There are many points within the D-MILS assurance case where the trustwor-thiness of an activity (process) must be assured.

Goal: activityParts It must be demonstrated that each of the participants in an activity are suffi-ciently trustworthy to undertake that activity.

Goal: partTrust A claim of this type is made for each of the participants in an activity. The appro-priate supporting claim for this must be selected based upon the type of the participant (tool,person or organisation).

Goal: tool This claim is made where the participant in an activity is a tool. This claim is supportedby an argument of the form presented in the Tool argument pattern (see section 2.7).

Goal: person This claim is made where the participant in an activity is a person. This claim issupported by an argument of the form presented in the Person argument pattern (see section2.8).

Goal: organisation This claim is made where the participant in an activity is an organisation. Thisclaim is supported by an argument of the form presented in the Organisation argument pattern(see section 2.9).

Goal:activityReqs It must be demonstrated that each of the artefacts required in order to performthe activity is sufficiently trustworthy.

Goal: reqArtTrust A claim of this type is created for each artefact required by an activity. Thisclaim is supported by an argument of the form presented in the Artefact argument pattern (seesection 2.12.3).

Goal:activityTech It must be demonstrated that the techniques used to perform the activity are suf-ficiently trustworthy.

Page 28 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 35: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

Go

al:

act

ivit

yTru

st

{Act

ivit

y}is

suff

icie

ntl

ytr

ust

wo

rth

y

Stra

t:a

ctiv

ityT

rust

Arg

um

en

to

ver

pe

rfo

rman

ceo

f{A

ctiv

ity}

Go

al:

act

ivit

yP

art

s

{Act

ivit

y}p

art

icit

pa

nts

are

suff

icie

ntl

ytr

ust

wo

rth

y

Go

al:

act

ivit

yRe

qs

{Act

ivit

y}re

qu

ire

dar

tefa

cts

are

suff

icie

ntl

ytr

ust

wo

rth

y

Go

al:

act

ivit

yTe

ch

Tech

niq

ue

su

sed

for

{Act

ivit

y}ar

esu

ffic

ien

tly

tru

stw

ort

hy

Go

al:

act

ivit

yPro

ds

Pro

du

ced

arte

fact

sfr

om

{Act

ivit

y}ar

esu

ffic

ien

tly

tru

stw

ort

hy

Go

al:

sub

Act

ivit

ies

Sub

-act

ivit

ies

of

{Act

ivit

y}ar

esu

ffic

ien

tly

tru

stw

ort

hy

Co

n:

pa

rtic

ipa

nts

pa

rtic

ipa

nts

:{A

ctiv

ity.

par

tici

pan

t.al

lIn

stan

ces(

)}

Co

n:

req

uir

ed

Art

efa

cts

req

uir

ed

arte

fact

s:{A

ctiv

ity.

req

uir

ed

Art

efa

ct.a

llIn

stan

ces(

)}

Co

n:

tech

niq

ue

s

Te

chn

iqu

es:

{Act

ivit

y.te

chn

iqu

e.a

llIn

stan

ces(

)}

Co

n:

pro

du

ced

Art

efa

cts

Pro

du

ced

art

efa

cts:

{Act

ivit

y.p

rod

uce

dA

rte

fac

t.al

lInst

ance

s()}

Co

n:

sub

Act

ivit

ies

Sub

-act

ivit

ies:

{Act

ivit

y.su

bA

ctiv

ity.

allI

nst

ance

s()}

Go

al:

sub

Act

ivit

{su

bA

ctiv

ity}

issu

ffic

ien

tly

tru

stw

ort

hy

no

.of

{su

bA

ctiv

ity}

{Act

ivit

y}:=

{su

bA

ctiv

ity}

Go

al:

pa

rtT

rust

{pa

rtic

ipan

t}is

suff

icie

ntl

ytr

ust

wo

rth

y

no

.of

{par

tici

pan

t}n

o.o

f{r

equ

ired

Art

efa

ct}

no

.of

{tec

hn

iqu

e}n

o.o

f{p

rod

uce

dA

rtef

act}

Go

al:

too

l_T

oo

l

{par

tici

pan

t}to

oli

ssu

ffic

ien

tly

tru

stw

ort

hy

To

ol

par

tici

pan

tty

pe:

{to

ol,

pe

rso

n,

org

anis

atio

n}

Go

al:

pe

rso

n_

Pe

rso

n

{pa

rtic

ipan

t}p

ers

on

issu

ffic

ien

tly

tru

stw

ort

hy

Pe

rso

n

Go

al:

org

anis

ati

on

_O

rgan

isa

tio

n

{pa

rtic

ipan

t}o

rgan

isat

ion

issu

ffic

ien

tly

tru

stw

ort

hy

Org

anis

ati

on

Go

al:

tech

niq

ue

Tru

st_

Te

chn

iqu

e

{te

chn

iqu

e}

issu

ffic

ien

tly

tru

stw

ort

hy

Tec

hn

iqu

e

Go

al:

pro

dA

rtT

rust

_A

rte

fact

{pro

du

ced

arte

fact

}is

suff

icie

ntl

ytr

ust

wo

rth

y

Art

efa

ct

Go

al:

req

Art

Tru

st_

Art

efa

ct

{re

qu

ire

dar

tefa

ct}

issu

ffic

ien

tly

tru

stw

ort

hy

Art

efa

ct

Figure 7: D-MILS process assurance case argument pattern

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 29

Page 36: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

Goal: techniqueTrust A claim of this type is created for each technique applied in performing anactivity. This claim is supported by an argument of the form presented in the Technique argu-ment pattern (see section 2.11).

Goal:activityProds It must be demonstrated that each of the artefacts generated as a result of per-forming an activity is sufficiently trustworthy.

Goal: ProdArtTrust A claim of this type is created for each artefact produced by an activity. Thisclaim is supported by an argument of the form presented in the Artefact argument pattern (seesection 2.12.3).

Goal:subActivities It must be demonstrated that each of the sub-activities of an activity is suffi-ciently trustworthy.

Goal: subActivit A claim of this type is created for each sub-activity. This claim is supported byapplying the same process argument pattern (as described here) to each sub-activity i.e. theargument for a sub-activity has the same form as that for the activity itself.

Applicability

This pattern is applicable to any process. An example process model is provided below, howevernote that it is not required to produce a process model in order to apply this pattern.

Consequences

Once this pattern is instantiated, the following claims will be created that require support:

Goal: tool This claim must be supported by argument and evidence as defined by the Tool assurancecase pattern.

Goal: person This claim must be supported by argument and evidence as defined by the Personassurance case pattern.

Goal: organisation This claim must be supported by argument and evidence as defined by the Or-ganisation assurance case pattern.

Goal: reqArtTrust This claim must be supported by argument and evidence as defined by the Artefactassurance case pattern.

Goal: techniqueTrust This claim must be supported by argument and evidence as defined by theTechnique assurance case pattern.

Goal: prodArtTrust This claim must be supported by argument and evidence as defined by the Arte-fact assurance case pattern.

Related Patterns

The argument created from this pattern supports the arguments created using the D-MILS composi-tion and implementation patterns and requires support from arguments created using the tool, person,organisation, artefact and technique argument patterns.

Page 30 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 37: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

Act

ivit

y:O

CR

AC

on

trac

tC

hec

kin

g

Art

efa

ct:M

ILS-

AA

DL

mo

del

----

----

----

----

----

----

----

----

----

---

vers

ion

ID:?

dat

e:?

Tech

niq

ue:

OC

RA

----

----

----

----

----

----

----

----

----

----

---

Pro

ven

ance

:OC

RA

tech

niq

ue

isju

stif

ied

asm

eth

od

for

che

ckin

gp

rop

erti

esin

rep

ort

ref

?

tech

niq

ue

Par

tici

pan

t:O

CR

Ato

ol

----

----

----

----

----

----

----

----

----

-q

ual

ifie

d:f

alse

qu

alif

icat

ion

:nu

llo

bje

ctiv

e:V

erif

yre

qu

irem

ents

form

aliz

edin

toO

CR

Aco

ntr

acts

vers

ion

:?in

tegr

ity:

nu

ll

par

tici

pan

t

req

uir

edar

tefa

ct

Act

ivit

y:Tr

ansl

atio

nM

ILS-

AA

DL

toO

CR

A

Art

efac

t:O

CR

Aco

ntr

act

spec

ific

atio

n--

----

----

----

----

----

----

----

-ve

rsio

nID

:?D

ate:

?

req

uir

edar

tefa

ct

sub

Act

ivit

y pro

du

ced

arte

fact

par

tici

pan

t

Ass

ura

nce

Ass

etEv

alu

atio

n:O

CR

Asp

ecco

nsi

ste

ncy

chec

k--

----

----

----

----

----

----

----

----

----

-cr

iter

ion

:OC

RA

spec

ific

atio

nis

con

sist

ent

eval

uat

ion

Res

ult

:Co

nsi

ste

ncy

chec

kre

f?

rati

on

ale:

eval

uat

ion

Ass

ura

nce

Ass

etEv

alu

atio

n:

OC

RA

too

lte

stin

g--

----

----

----

----

----

----

----

----

----

-cr

iter

ion

:To

olw

illn

ot

inco

rrec

tly

rep

ort

ap

osi

tive

resu

ltev

alu

atio

nR

esu

lt:T

est

rep

ort

ref

?ra

tio

nal

e:

eva

luat

ion

Par

tici

pan

t:C

om

pas

sTo

ol

----

----

----

----

----

----

----

----

----

-q

ual

ifie

d:f

alse

qu

alif

icat

ion

:nu

llo

bje

ctiv

e:Tr

ansl

ate

MIL

S-A

AD

Lsp

ecif

icat

ion

toO

CR

Ave

rsio

n:?

inte

grit

y:n

ull

Ass

ura

nce

Ass

etEv

alu

atio

n:

Co

mp

ass

too

lte

stin

g--

----

----

----

----

----

----

----

----

----

-cr

iter

ion

:To

olo

utp

ut

isse

man

tica

llyeq

uiv

alen

tto

inp

ut

eval

uat

ion

Re

sult

:Tes

tre

po

rtre

f?

rati

on

ale:

eval

uat

ion

req

uir

ed

arte

fact

Act

ivit

y:O

CR

Are

fin

emen

tch

eck

sub

Act

ivit

y

Figure 8: Example process model for the activity of checking OCRA contracts

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 31

Page 38: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

2.6.2 Pattern instantiation

When instantiating the pattern the following information regarding the target system is required.The source describes the suggested source for the required information, see section 3 for details onautomatically instantiating the argument pattern with the required information.

RolesRole Description SourceActivity Name of the process activity Process modelparticipant A participant in an activity Process modelrequiredartefact

An artefact required to perform anactivity

Process model

technique A technique applied in performingan activity

Process model

producedartefact

An artefact generated from an activ-ity

Process model

subActivity Name of a sub-activity Process model

Choices

The appropriate child goal of Goal: partTrust should be chosen depending on the type of the partici-pant.

Optional

All of the child goals of Strat: activityTrust are optional and should only be instantiated if the relevantelements exist as part of the process.

2.6.3 Module Interface

This pattern forms a self-contained assurance case module that is intended to be used as part of alarger assurance case. This interface defines the assurance claims that this module can guarantee(to the assurance case), the dependencies that the module has on other modules (these dependenciesmust be assured for the guaranteed claim to be supported), and context and assumptions within whosescope the dependencies must be assured.

Guarantees

• {Activity} is sufficiently trustworthy

Dependencies

• {participant} tool is sufficiently trustworthy• {participant} person is sufficiently trustworthy• {participant} organisation is sufficiently trustworthy• {required artefact} is sufficiently trustworthy• {technique} is sufficiently trustworthy• {produced artefact} is sufficiently trustworthy

Page 32 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 39: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

Context

• participants• required artefacts• techniaues• produced artefacts• sub-activities

AssumptionsNone

2.7 Tool

2.7.1 Pattern description

StructureThe pattern structure is shown in figure 9.

IntentThis pattern is used to argue about the trustworthiness of tools used as part of a process included inthe assurance case.

Participants

Goal: tool It must be demonstrated that the tool is trustworthy to use in its role as part of an activ-ity. This is done by showing that it is appropriate for that task and that it has the necessaryassurance.

Goal: toolProv The required integrity of the tool must be determined. This will be determined fromconsideration of the criticality of the activity for which the tool is used. This will depend,amongst other things, on the assurance requirements placed upon the system as a whole.

Goal: toolQualify If a tool has been qualified (to some standard) then the argument should demon-strate that the objectives of that standard have been met. The nature of this argument willdepend upon the standard being applied. The integrity level achieved for the tool throughqualification should be at least that which was determined to have been required.

Goal: objectives The objectives of using the tool as part of the activity should be clearly defined.A claim is made that the defined objectives are met. To show the objectives are met it isnecessary to perform some evaluation of the tool against those objectives. An argument aboutthe development of the tool may also be provided to give confidence that the objectives aremet.

Goal: evaluations A number of evaluations may be performed on the tool, such as tests, to showthat the tool meets its objectives. The type and number of evaluations performed will dependupon the required integrity of the tool.

Goal: evaluation A claim of this type is created for each evaluation performed on the tool.

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 33

Page 40: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance caseG

oal

:to

ol

{par

tici

pan

t}to

oli

ssu

ffic

ien

tly

tru

stw

ort

hy

Go

al:t

oo

lAp

pro

{to

ol}

isap

pro

pri

ate

for

{Act

ivit

y}

Go

al:t

oo

lPro

v

{to

ol}

has

nec

essa

ryas

sura

nce

Co

n:

pro

ven

ance

det

erm

ined

req

uir

edin

tegr

ity

of

too

l:{r

eq

uir

ed

too

lin

tegr

ity}

Go

al:

too

lQu

alif

y

{to

ol}

isq

ual

ifie

dto

the

req

uir

edst

and

ard

Go

al:o

bje

ctiv

es

{to

ol}

me

ets

its

def

ine

do

bje

ctiv

es

Co

n:

ob

ject

ive

too

lob

ject

ive

:{o

bje

ctiv

e}

Go

al:t

oo

lDev

The

de

velo

pm

ent

of

{tec

hn

iqu

e}

too

len

sure

so

bje

ctiv

eis

me

t

Stra

t:to

olD

ev

Arg

um

en

to

ver

too

ld

evel

op

men

tp

roce

ss

no

of

{act

ivit

ies}

into

ol

de

velo

pm

en

tp

roce

ss

Co

n:

acti

viti

es

life

cycl

eac

tivi

ties

req

uir

ing

con

sid

erat

ion

det

erm

ine

db

y{r

eq

uir

ed

too

lin

tegr

ity}

:{a

ctiv

itie

s}

Co

n:

inte

grit

y

too

lach

ieve

din

tegr

ity

leve

l:{t

oo

lin

tegr

ity}

Go

al:

acti

vity

Tru

st_

Mo

du

le1

{Act

ivit

y}is

suff

icie

ntl

ytr

ust

wo

rth

y

Mo

du

le1

Stra

t:e

valu

atio

ns

Arg

um

ent

ove

re

ach

eval

uat

ion n

o.o

f{e

valu

atio

ns}

Go

al:

eval

uat

ion

{eva

luat

ion

}d

em

on

stra

tes

corr

ectn

ess

of

{to

ol}

Go

al:

eva

luat

ion

s

Eval

uat

ion

so

fto

olo

pe

rati

on

de

mo

nst

rate

sth

ed

efin

ed

too

lo

bje

ctiv

eis

met

Go

al:e

valR

es

{eva

luat

ion

}re

sult

dem

on

stra

tes

de

fin

edcr

ite

rio

nis

met

Co

n:c

rite

rio

n

def

ine

dcr

iter

ion

:{c

rter

ion

}

So

l:ev

alR

es

{eva

lua

tion

resu

lt}

J

Just

:rat

ion

ale

{rat

ion

ale

}

Go

al:e

valA

pp

rop

ria

te

Eval

uat

ion

resu

ltis

app

rop

riat

efo

re

valu

atin

g{t

oo

l}

Co

n:

arte

fact

Ver

sio

n

Art

efa

ctve

rsio

n:

{ver

sio

nID

}

Co

n:

arte

fact

Dat

e

Art

efac

td

ate

:{d

ate}

Figure 9: D-MILS tools assurance case argument pattern

Page 34 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 41: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

Goal: evalRes Each evaluation performed on a tool must have criterion defined that specify explic-itly what the evaluation is trying to demonstrate. A claim should be made that the results of theevaluation are able to demonstrate that the criterion are met. Rationale explaining the relevanceof the evaluation result may also be provided.

Goal: evalAppropriate It must be shown that the evaluation results used are appropriate for thetool being evaluated. In particular it must be shown that the evaluation was performed on thecorrect version of the tool.

Goal: toolDev Depending upon whether the tool has been qualified or not, and on the required levelof integrity of the tool, a claim may be made that the tool has been developed in a trustworthymanner. This claim requires consideration of the process used to develop the tool. This requiresthat each of the activities in the development lifecycle of the tool is considered. Although forhigh integrity tools each lifecycle activity may be considered, for lower integrity, just a subsetof key activities may be included in the argument.

Goal: activityTrust For each activity in the tool development lifecycle that is being considered, aclaim regarding the trustworthiness of that activity must be made. This claim is supported byan argument of the form presented in the Process argument pattern (see section 2.6).

ApplicabilityThis pattern is applicable to any tool used as part of a process.

ConsequencesOnce this pattern is instantiated, the following claims will be created that require support:

Goal: toolAppro Argument and evidence must be provided to demonstrate that the chosen tool isappropriate to use for its intended role as part of the activity.

Goal: toolQualify Argument and evidence must be provided to demonstrate that the tool has beenqualified to the defined standard. This is an argument of conformance to the defined objectivesdefined in the standard.

Goal: evalAppropriate Argument and evidence must be provided to demonstrate that the referencedevaluation result is an appropriate item of evidence for the tool under consideration.

Goal: activityTrust This claim must be supported by argument and evidence as defined by the Pro-cess assurance case pattern.

Related PatternsThe argument created from this pattern supports the arguments created using the D-MILS processpattern and may also require support from arguments created using the process pattern.

2.7.2 Pattern instantiation

When instantiating the pattern the following information regarding the target system is required.The source describes the suggested source for the required information, see section 3 for details onautomatically instantiating the argument pattern with the required information.

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 35

Page 42: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

RolesRole Description Sourceparticipant A participant in an activity Process modeltool The name of the tool Process modelActivity Name of the process activity Process modelrequired toolintegrity

The integrity level that has been de-termined for the tool

Manual

tool integrity The integrity level that has beendemonstrated for the tool

Process model

objective The objective of the tool in this ac-tivity

Process model

evaluation Name of the evaluation performedon the tool

Process model

criterion Criterion to define what the evalua-tion will demonstrate

Process model

rationale Rationale for the appropriateness ofthe evaluation

Process model

version ID Version number of the tool beingevaluated

Process model

date Date on which the evaluation wasperformed

Process model

ChoicesNone.

OptionalGoal: toolQualify is only required for qualified tools. Goal: toolDev may not be required dependingupon the required integrity of the tool and whether it is qualified.

2.7.3 Module Interface

This pattern forms a self-contained assurance case module that is intended to be used as part of alarger assurance case. This interface defines the assurance claims that this module can guarantee(to the assurance case), the dependencies that the module has on other modules (these dependenciesmust be assured for the guaranteed claim to be supported), and context and assumptions within whosescope the dependencies must be assured.

Guarantees

• {participant} tool is sufficiently trustworthy

Dependencies

• {Activity} is sufficiently trustworthy

Context

Page 36 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 43: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

• determined required integrity of tool• tool objective• tool achieved integrity level• defined criterion• rationale• Artefact version• Artefact date• lifecycle activities requiring consideration

AssumptionsNone

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 37

Page 44: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

2.8 Person

2.8.1 Pattern description

Structure

The pattern structure is shown in figure 10.

Intent

This pattern is used to argue about the trustworthiness of people involved in a process included in theassurance case.

Participants

Goal: person It must be demonstrated that the person participating in the activity is trustworthyundertaking their role. This is done by showing that the person has the required attributes toperform the activity and also that the level of supervision and review provided is sufficient.

Goal: personAtt It must be demonstrated that the person participating in the activity has both thecapability and experience to perform the activity.

Goal: capability The capability of the person is demonstrated through the provision of evidence,such as the person’s qualifications or training record.

Goal: experience The experience of the person in carrying out the activity is demonstrated throughthe provision of evidence, such as the person’s CV.

Goal: supervision It is often necessary to supervise a person performing an activity and/or reviewtheir work. It must be demonstrated that the level of supervision and review provided is suf-ficient. The level of supervision and review required will depend upon the capability andexperience of the person performing the task and also upon the level of integrity required ofthe activity being performed. Where supervision is required, the trustworthiness of the super-visor may also need to be demonstrated, in this case the person argument pattern may also beapplied to the supervisor.

Applicability

This pattern is applicable to any person involved in performing a process activity.

Consequences

Once this pattern is instantiated, the following claims will be created that require support:

Goal: supervision Argument and evidence must be provided to demonstrate that the participant isprovided with sufficient supervision and review, as appropriate for the person’s attributes andthe required integrity of the activity.

Related Patterns

The argument created from this pattern supports the arguments created using the D-MILS processpattern.

Page 38 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 45: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

Goal: person

{participant} person issufficiently trustworthy

Strat: person

Argument overperson attributes

Goal: capability

{participant} has sufficientcapability to perform{Activity}

Goal: experience

{participant} hassufficient experience of{Activity}

Sol:capability

{capability}

Sol:experience

{experience}

Goal: personAtt

{participant} has the necessaryattributes to perform theactivity

Goal: supervision

{participant} has sufficient levelof supervison and review tosuccesfully perform the activity

Figure 10: D-MILS person assurance case argument pattern

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 39

Page 46: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

2.8.2 Pattern instantiation

When instantiating the pattern the following information regarding the target system is required.The source describes the suggested source for the required information, see section 3 for details onautomatically instantiating the argument pattern with the required information.

RolesRole Description Sourceparticipant A participant in an activity Process modelActivity Name of the process activity Process modelcapability Description of the person’s capabil-

ity to perform the activity or refer-ence to evidence of capability

Process model

experience Description of the person’s experi-ence in carrying out the activity orreference to evidence of that expe-rience

Process model

ChoicesNone

OptionalSupervision and review of the person may not always be necessary, and Goal: supervision is thereforeoptional. The person performing the task may not have demonstrable capability or experience inthat activity, therefore Goal: capability and Goal: experience are also marked as optional. In caseswhere either of these claims cannot be supported, it is likely that Goal: supervision will need to besupported.

2.8.3 Module Interface

This pattern forms a self-contained assurance case module that is intended to be used as part of alarger assurance case. This interface defines the assurance claims that this module can guarantee(to the assurance case), the dependencies that the module has on other modules (these dependenciesmust be assured for the guaranteed claim to be supported), and context and assumptions within whosescope the dependencies must be assured.

Guarantees

• {participant} person is sufficiently trustworthy

DependenciesNone

ContextNone

AssumptionsNone

Page 40 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 47: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

2.9 Organisation

2.9.1 Pattern description

StructureThe pattern structure is shown in figure 11.

Goal: organisation

{participant} organisation issufficiently trustworthy

Goal: indepOrg

{organisation} has necesaryindependence from otherorganisations

Goal: indepParts

Participants within{organisation} are sufficientlyindependent

Goal: orgAccredit

{organisation} hasrequired accreditation

Sol:accredit

{accreditation}

Figure 11: D-MILS organisation assurance case argument pattern

IntentThis pattern is used to argue about the trustworthiness of organisations involved in a process includedin the assurance case.

Participants

Goal: organisation It must be demonstrated that the organisation responsible for carrying out theactivity is trustworthy. This is done by showing that the organisation is sufficiently independentform other organisations involved in the activity, that all participants from the same organisa-tion are sufficiently independent from each other, and that the organisation has any accredita-tion that is required.

Goal: indepOrg Where multiple organisations are involved in fulfilling different activities within aprocess, it may be required to demonstrate that the organisations are independent from each

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 41

Page 48: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

other. This will particularly be the case where one organisation is validating or checking thework of another. The level of independence required for activities will often depend upon therequired integrity of the process being performed.

Goal: indepParts Where multiple people from the same organisation are involved in carrying outactivities, it may be required to demonstrate that those individuals, despite being membersof the same organisation, are sufficiently independent from each other. This will particularlybe the case where one person is validating or checking the work of another. The level ofindependence required for activities will often depend upon the required integrity of the processbeing performed.

Goal: orgAccredit It must be demonstrated that an organisation carrying out an activity has all therelevant required accreditation. The nature and level of accreditation required will be deter-mined based upon the required integrity of the process being performed and the requirementsof relevant standards for the domain of the target system.

Applicability

This pattern is applicable to any organisation involved in performing a process activity.

Consequences

Once this pattern is instantiated, the following claims will be created that require support:

Goal: indepOrg Argument and evidence must be provided to demonstrate that the organisation issufficiently independent from other organisations involved in the process, as determined by thenature of the activities performed by the organisations, the required integrity of the process andrequirements of the relevant standards.

Goal: indepParts Argument and evidence must be provided to demonstrate that the participants fromwithin an organisation involved in an activity are sufficiently independent from other partici-pants from the same organisation, as determined by the nature of the activities performed by theorganisations, the required integrity of the process and requirements of the relevant standards.

Related Patterns

The argument created from this pattern supports the arguments created using the D-MILS processpattern.

2.9.2 Pattern instantiation

When instantiating the pattern the following information regarding the target system is required.The source describes the suggested source for the required information, see section 3 for details onautomatically instantiating the argument pattern with the required information.

Roles

Page 42 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 49: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

Role Description Sourceparticipant A participant in an activity Process modelorganisation Name of the organisation Process modelaccreditation Description of the organisation’s

accreditation or reference to accred-itation

Process model

ChoicesNone

OptionalAll of the child goals of Goal: organisation are optional. Whether these claims are required in theassurance case will be determined based upon consideration of the nature of the activities performedby the organisation, the required integrity of the process and requirements of the relevant standards.

2.9.3 Module Interface

This pattern forms a self-contained assurance case module that is intended to be used as part of alarger assurance case. This interface defines the assurance claims that this module can guarantee(to the assurance case), the dependencies that the module has on other modules (these dependenciesmust be assured for the guaranteed claim to be supported), and context and assumptions within whosescope the dependencies must be assured.

Guarantees

• {participant} organisation is sufficiently trustworthy

DependenciesNone

ContextNone

AssumptionsNone

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 43

Page 50: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

2.10 Artefact

2.10.1 Pattern description

StructureThe pattern structure is shown in figure 12.

Goal: prodArtTrust

{produced artefact} issufficiently trustworthy

Strat: prodArtTrust

Argument over eachevaluation

no. of {evaluations}

Goal: evaluation

{evaluation} demonstratescorrectness of {producedartefact}

Goal: evaluations

Evaluations of {producedartefact} demonstratecorrectness

Goal: artefactConf

Set of evaluations performedprovide sufficient confidencein {produced artefact}

Goal: reqArtTrust

{required artefact} issufficiently trustworthy

Goal: evalRes

{evaluation} resultdemonstrates definedcriterion is met

Con: criterion

defined criterion:{crterion}

Sol:evalRes

{evaluationresult}

J

Just: rationale

{rationale}

Goal: evalAppropriate

Evaluation result isappropriate for evaluating{artefact}

Con:artefactVersion

Artefact version:{version ID}

Con: artefactDate

Artefact date:{date}

Figure 12: D-MILS artefact assurance case argument pattern

IntentThis pattern is used to argue about the trustworthiness of artefacts either required by, or produced by,activities included in the assurance case.

Participants

Goal: reqArtTrust It must be demonstrated that all artefacts required in order to perform an activityare trustworthy. This is done performing evaluations of the artefact.

Page 44 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 51: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

Goal: prodArtTrust It must be demonstrated that all artefacts produced as a result of performingan activity are trustworthy. This is done performing evaluations of the artefact.

Goal: evaluation For each evaluation performed on an artifact a claim is created that the evaluationdemonstrates the correctness of that artefact.

Goal: evaluations A number of evaluations may be performed on an artefact, such as tests or re-views, to show that the artefact is correct. The type and number of evaluations performed willdepend upon the required integrity of the artefact.

Goal: evaluation A claim of this type is created for each evaluation performed of the artefact.

Goal: evalRes Each evaluation performed on an artefact must have criterion defined that specifyexplicitly what the evaluation is trying to demonstrate. A claim should be made that the resultsof the evaluation are able to demonstrate that the criterion are met. Rationale explaining therelevance of the evaluation result may also be provided.

Goal: evalAppropriate It must be shown that the evaluation results used are appropriate for theartefact being evaluated. In particular it must be shown that the evaluation was performed onthe correct version of the artefact.

Goal: artefactConf It must be shown that the evaluation, or set of evaluations, that are performedon the artefact are appropriate to provide the required level of confidence in the correctness ofthe artefact.

Applicability

This pattern is applicable to any artefact required by or produced by a process activity.

Consequences

Once this pattern is instantiated, the following claims will be created that require support:

Goal: artefactConf Argument and evidence must be provided to demonstrate that the evaluationsperformed on the artefact provide the required confidence in that artefact’s correctness.

Goal: evalAppropriate Argument and evidence must be provided to demonstrate that the referencedevaluation result is an appropriate item of evidence for the artefact under consideration.

Related Patterns

The argument created from this pattern supports the arguments created using the D-MILS processpattern.

2.10.2 Pattern instantiation

When instantiating the pattern the following information regarding the target system is required.The source describes the suggested source for the required information, see section 3 for details onautomatically instantiating the argument pattern with the required information.

Roles

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 45

Page 52: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

Role Description Sourcerequiredartefact

An artefact required by an activity Process model

producedartefact

An artefact produced by an activity Process model

evaluation Name of the evaluation performedon the artefact

Process model

criterion Criterion to define what the evalua-tion will demonstrate

Process model

rationale Rationale for the appropriateness ofthe evaluation

Process model

version ID Version number of the artefact be-ing evaluated

Process model

date Date on which the evaluation wasperformed

Process model

ChoicesNone

OptionalNone

2.10.3 Module Interface

This pattern forms a self-contained assurance case module that is intended to be used as part of alarger assurance case. This interface defines the assurance claims that this module can guarantee(to the assurance case), the dependencies that the module has on other modules (these dependenciesmust be assured for the guaranteed claim to be supported), and context and assumptions within whosescope the dependencies must be assured.

Guarantees

• {required artefact} is sufficiently trustworthy• {produced artefact} is sufficiently trustworthy

DependenciesNone

Context

• defined criterion• rationale• artefact version• artefact date

AssumptionsNone

Page 46 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 53: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

2.11 Technique

2.11.1 Pattern description

StructureThe pattern structure is shown in figure 13.

Goal: techniqueTrust

{technique} is sufficientlytrustworthy

Goal: techAppro

{technique} isappropriate for {Activity}

Goal: techProv

{technique} hasnecessary provenance

Sol:provenance

{provenance}

Figure 13: D-MILS technique assurance case argument pattern

IntentThis pattern is used to argue about the trustworthiness of techniques applied when performing activ-ities included in the assurance case.

Participants

Goal: techniqueTrust It must be demonstrated that any techniques used to perform an activity aretrustworthy. This is done by considering the appropriateness and provenance of the techniqueapplied.

Goal: techAppro It must be demonstrated that any technique chosen to perform the activity is ap-propriate. The appropriateness of different techniques will depend upon the nature of the ac-tivity, but may also depend upon factors such as the standards being applied or the requiredintegrity of the activity.

Goal: techProv It must be demonstrated that the chosen technique has the necessary provenance,this should include consideration of the extent of its application for the activity in other systemsand the robustness and explicitness of its definition. The technique should also be systematicin its application and have objective acceptance criteria.

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 47

Page 54: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

Applicability

This pattern is applicable to any technique applied when performing a process activity.

Consequences

Once this pattern is instantiated, the following claims will be created that require support:

Goal: techAppro Argument and evidence must be provided to demonstrate that the the techniquechosen to use to perform the activity is appropriate.

Related Patterns

The argument created from this pattern supports the arguments created using the D-MILS processpattern.

2.11.2 Pattern instantiation

When instantiating the pattern the following information regarding the target system is required.The source describes the suggested source for the required information, see section 3 for details onautomatically instantiating the argument pattern with the required information.

RolesRole Description Sourcetechnique The name of the technique applied

applied for an activityProcess model

provenance Description of the technique’sprovenance or reference to evi-dence of capability

Process model

Choices

None

Optional

None

2.11.3 Module Interface

This pattern forms a self-contained assurance case module that is intended to be used as part of alarger assurance case. This interface defines the assurance claims that this module can guarantee(to the assurance case), the dependencies that the module has on other modules (these dependenciesmust be assured for the guaranteed claim to be supported), and context and assumptions within whosescope the dependencies must be assured.

Guarantees

• {technique} is sufficiently trustworthy

Page 48 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 55: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

DependenciesNone

ContextNone

AssumptionsNone

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 49

Page 56: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

2.12 TTEthernet

2.12.1 Pattern description

Structure

The pattern structure is shown in figure 14.

Intent

This pattern is used to argue about the assurance of the TTEthernet network used as part of a D-MILSplatform.

Participants

Goal: TTEgtee It must be demonstrated that the TTE network ensures that only the desired connec-tions between nodes, as defined in the GIFP are possible. This is done by considering how theGIFP is implemented on the network, and also how the implemented configuration is enforced.And also how that configuartion is enforced by the network.

Goal: TTEconfigImp To demonstrate that the configuration is correctly implemented by the TTEhardware, the way in which the harware is configured is considered. It must also be demon-strated that once configured, the hardware cannot be changed inadvertently.

Goal: hwConfigDownload The correctness of the hardware configuration is achieved by download-ing the configuration data to the node controllers and switches using an application on a centralworkstation.

Goal: configChange It is ensured that the configured hardware cannot be inadvertently changed byrequiring switch pins to be manually set before switch configuration can be changed. Nodesand switches can only be reconfiguration if they are re-programmed.

Goal: TTEconfigCorrect It must be demonstrated that the configuration file used to configure theTTE network is correct with respect to the GIFP. This claim is supported by a claim in theimplementation module about the correctness of the target specific configurations that are gen-erated (see section 2.4).

Goal: TTEcommsConsist It is ensured that network communication is consistent with the imple-mented configuration through a fault tolerant design of the TTE switches and endpoint cards,by guaranteeing temporal behaviour of network frames, and by ensuring that malicious attackson the network are mitigated.

Goal: TTEfaultTolDes It must be demonstrated that the network employs a fault tolerant design.This is done by demonstrating that faulty frames cannot be generated and guaranteeing theavailability of frames.

Goal: faultIntercept An faulty frames are intercepted by a monitor. This is supported by the evi-dence from the design of the high integrity TTE switches and endpoint cards.

Goal: availableFrames Path redundancy is to ensure the availability of frames is demonstrated bythe design of the TTE network.

Page 50 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 57: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

Go

al:T

TEgt

ee

TTEt

hern

etgu

aran

tees

that

only

the

conn

ecti

on

ssp

ecif

ied

inth

eG

IFP

are

poss

ible

.

Stra

t:TT

Egte

e

Arg

ume

nt

over

imp

lem

en

tati

on

and

enfo

rcem

en

tof

GIF

P

Go

al:T

TEco

nfi

gIm

p

TTE

conf

igu

rati

on

file

isco

rrec

tly

imp

lme

nte

db

yth

eTT

Eh

ardw

are

Go

al:T

TEco

nfi

gCo

rrec

t

TTE

con

figu

rati

on

file

isco

rrec

tw

ith

resp

ect

toG

IFP

Go

al:t

arge

tCo

nfi

gs_I

mp

lem

enta

tio

n

The

targ

etsp

ecif

icco

nfi

gura

tio

ns

are

syn

tact

ical

lyan

dse

man

tica

llyco

rrec

tw

ith

resp

ect

toth

eco

nfi

gura

tion

Imp

lem

enta

tio

n

Go

al:T

TEfa

ult

TolS

uf

An

alys

iso

fTT

En

etw

ork

dem

on

stra

tes

the

suff

icie

ncy

of

TTE

fau

ltto

lera

nce

Go

al:T

TEfa

ult

TolD

es

TTE

swit

ches

and

end

po

int

card

sha

vefa

ilure

tole

ran

td

esig

n

Go

al:i

nFr

ames

Inco

rrec

tfr

ame

sca

nno

tbe

gen

erat

ed

Go

al:a

vaila

ble

Fram

es

The

avai

lab

ility

of

fram

es

isen

sure

dth

rou

ghp

ath

red

un

danc

y

Go

al:f

ault

Inte

rcep

t

All

fau

lty

fram

esar

ein

terc

epte

db

ya

mo

nit

or

So

l:s

wit

ch

De

sig

n

TT

EH

igh

Inte

gri

tysw

itch

de

sig

n

So

l:c

ard

De

sig

n

TT

EH

igh

Inte

gri

tye

nd

poin

tca

rdde

sign

So

l:n

etw

ork

Des

ign

TT

Ene

twork

de

sig

n

So

l:n

etw

ork

An

aly

sis

{Re

sults

of

ne

two

rkfa

ult

pro

pag

atio

na

naly

sis}

Go

al:t

emp

Beh

TTE

ensu

res

tem

po

ral

beh

avio

ur

of

fram

es

Go

al:s

yncT

ime

Syn

cron

ised

tim

eis

mai

nta

ined

inth

en

etw

ork

even

inth

ep

rese

nce

offa

ilure

s Stra

t:sy

ncT

ime

Arg

ume

nt

ove

rTT

Esy

nch

ron

isat

ion

pro

toco

ls

Go

al:p

erm

Fn

Perm

ena

nce

fun

tio

nen

sure

slo

calc

lock

so

fco

mp

one

nts

are

syn

chro

nise

d

Go

al:c

lock

Syn

c

Clo

ck-s

ynch

roni

zati

on

prot

oco

len

sure

ssy

nch

roni

sed

glo

bal

tim

eis

mai

nta

ined

Go

al:c

lock

Syn

cPre

cisi

on

Prec

isio

no

fth

esy

stem

isim

pro

ved

byde

tect

ing

and

rem

ovi

ng

fau

lty

TTE

dev

ices

from

cloc

k-sy

nch

ron

isat

ion

So

l:p

erm

Fn

Veri

f

Fo

rma

lve

rific

atio

nre

sults

for

pe

rmen

ance

fun

ctio

n

So

l:c

loc

kS

yn

cV

eri

f

Form

al

verific

atio

nre

sults

for

clo

ck-

synch

ronis

atio

n

Go

al:p

reci

son

Bo

un

d

Form

alve

rifi

cati

ond

emo

nstr

ates

the

bou

ndo

fo

vera

llpr

ecis

ion

So

l:p

rec

isio

nV

eri

f

Form

al

veri

ficatio

nre

sults

Go

al:h

wC

on

figD

ow

nlo

ad

Co

nfi

gura

tio

nda

tais

do

wn

load

edin

toen

dno

de

con

tro

llers

and

swit

ches

ove

rTT

En

etw

ork

fro

map

plic

atio

no

nce

ntr

alw

ork

stat

ion

Go

al:s

wit

chC

han

ge

Ch

ange

sto

swit

chco

nfi

gura

tio

ns

are

onl

yp

ossi

ble

wh

ensw

itch

pin

sh

ave

bee

nm

anu

ally

set

Go

al:c

on

figR

etai

n

Bo

then

dn

ode

san

dsw

itch

esre

tain

thei

rco

nfig

ura

tio

nu

nti

lth

eyar

ere

-pro

gram

med

Go

al:h

ard

war

eCo

nfi

g

The

hard

war

eis

con

figu

red

acco

rdin

gto

the

con

figu

rati

on

file

s

Go

al:c

on

figC

han

ge

The

con

figu

rati

ono

fth

eTT

Eh

ard

war

eca

nno

tb

ein

adve

rten

tly

chan

ged

Go

al:T

TEco

mm

sCo

nsi

sit

TTE

ensu

res

that

only

com

mun

icat

ions

con

sist

ent

wit

hth

eim

ple

me

nted

con

figu

rati

on

occ

ur

Go

al:T

TEfa

ult

Tol

TTE

net

wo

rkfa

ult

tole

ran

td

esig

nen

sure

sco

nsis

tenc

yo

fco

mm

uni

cati

on

s

Go

al:a

ttac

ks

Mal

icio

usat

tack

so

nth

eTT

En

etw

ork

will

no

taf

fect

the

con

sist

ency

ofc

om

mun

icat

ions

Star

t:at

tack

s

Arg

ume

nt

over

mit

igat

ion

ofi

den

tifi

edat

tack

scen

ario

s

Go

al:a

ttac

kMit

igat

e

All

iden

tifi

edat

tack

scen

ario

sar

em

itig

ated

Go

al:a

ttac

kCo

mp

The

iden

tifi

edat

tack

scen

ario

sar

eco

mp

lete

So

l:a

ttac

kM

itig

ate

Att

ack

-sp

eci

ficm

itiga

tion

s

Co

n:a

ttac

ks

Att

ack

scen

ario

sd

efin

edin

rep

ort

D6.

5

Co

n:m

itig

atio

ns

Mit

igat

ion

sd

efin

edin

rep

ort

D6.

5

Figure 14: TTEthernet assurance case argument pattern

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 51

Page 58: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

Goal: TTEfaultTolSuf The sufficiency of the TTE fault tolerant design is demonstrated by analysisperformed on the TTE network.

Sol: networkAnalysis The results of the fault propagation analysis performed on the network areused as evidence of the sufficiency if the TTE fault tolerant design.

Goal: syncTime To ensure the temporal behaviour of network frames it must be demonstrated thateven in the presence of failures, synchronised time is maintained across the network. Thisis done through the use of synchronisation protocols. These are a permanence function tosynchronise the local clocks of components and clock-synchronization protocol to synchro-nise global time. In addition the precision of the synchronisation is improved by detectingand removing faulty TTE devices. All of these claims are supported by the results of formalverification.

Goal: attackMitigate The identified attack scenarios for TTE along with their mitigations are de-tailed in D-MILS deliverable D6-5 [4].

Applicability

This pattern is applicable to TTE networks used as part of a D-MILS platform.

Consequences

Once this pattern is instantiated, the following claims will be created that require support:

Goal: hwConfigDownload Argument and evidence must be provided to demonstrate that configura-tion data is successfully downloaded to nodes and switches.

Goal: switchChange Argument and evidence must be provided to demonstrate that no changes canbe made to switches unless switch pins are set.

Goal: configRetain Argument and evidence must be provided to demonstrate that nodes and switchesretain their configuration.

Goal: attackComp Argument and evidence must be provided to demonstrate that the identified attackscenarios are complete.

Related Patterns

The argument created from this pattern supports the argument created using the D-MILS Platformpattern and requires support from arguments created using the implementation argument pattern.

2.12.2 Pattern instantiation

When instantiating the pattern the following information regarding the target system is required.The source describes the suggested source for the required information, see section 3 for details onautomatically instantiating the argument pattern with the required information.

Roles

Page 52 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 59: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

Role Description SourceResults ofnetwork faultpropagationanalysis

reference to the results of the faultpropagation analysis

Manual

ChoicesNone

OptionalNone

2.12.3 Module Interface

This pattern forms a self-contained assurance case module that is intended to be used as part of alarger assurance case. This interface defines the assurance claims that this module can guarantee(to the assurance case), the dependencies that the module has on other modules (these dependenciesmust be assured for the guaranteed claim to be supported), and context and assumptions within whosescope the dependencies must be assured.

Guarantees

• TTEthernet guarantees that only the connections specified in the GIFP are possible.

Dependencies

• The target specific configurations are syntactically and semantically correct with respect to theconfiguration

ContextNone

AssumptionsNone

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 53

Page 60: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

3 Automated Instantiation

In order to further facilitate the creation of assurance cases for D-MILS systems we have developed atool that can be used to automatically generate large parts of the assurance case. For those parts of theassurance case that cannot be automatically constructed, the explicit assurance claims requiring fur-ther development are presented to the user and become assurance obligations that must be dischargedin order to create a complete assurance case.

The tool that has been developed uses a model-based approach to instantiate the D-MILS assurancecase patterns using information about the target system extracted directly from the system models.This section describes the operation of the D-MILS model-based assurance case (MBAC) tool, withparticular focus on how the user is expected to interact with the tool to create an assurance caseargument for the system. An example of how the tool is used to create an assurance case argumentfor an example D-MILS system is presented in section 4.

In the following sections we describe each of the elements of the tool illustrated in figure 15.

3.1 GSN Pattern Models

The GSN patterns described in this document, which define the required structure of the D-MILSassurance case argument, are taken as input to the MBAC tool. This requires that the graphicalpattern structure is converted to a model of the GSN pattern captured as an XML file. We refer to theGSN model files as GSNML files. The GSN pattern model must conform to the GSN meta-modelthat we defined in [3]. In order to facilitate the creation of GSNML files we have created a graphicalmodel editor that allows GSN pattern structures to be easily and intuitively developed graphically,and then exported automatically as GSNML files conformant to the GSN metamodel. The GSNgraphical model editor runs as an stand-alone Eclipse application.

Since the D-MILS patterns have already been defined, and the corresponding GSNML files created,it will often be unnecessary for the system developer to use the GSN graphical editor to create patternmodels. However, there may be situations where the system developer wishes to make changes to,or add more detail to, existing patterns. In such cases the graphical editor is available. This mayparticularly be the case for third party component developers who may wish to reflect application-specific features in the patterns.

The GSNML files must be added to the project workspace of the MBAC program.

3.2 System Models

The system models are the models of the system that contain the information necessary to instantiatethe argument patterns. The pattern descriptions in section 2.5 detailed the sources of the implemen-tation information regarding the target system. These source models are taken as input to the MBACtool. The system models must be captured in XML files, and conform to a defined meta-model(which is used in creating the weaving model - see section 3.3). The system model XML files mustbe added to the project workspace of the MBAC program.

Page 54 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 61: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

1. GSN PatternModels: gsnml

2. SystemModels: xml

3. WeavingModel:

graphML

4. MBACprogram: eol

5. Configuration

6. GSNArgument

Model: gsnml

Figure 15: The D-MILS model-based assurance case tool

3.3 Weaving Model

The weaving model is a model of the dependencies that exist between the models that are takenas input by the MBAC tool. The dependencies are captured in the weaving model by specifyingrelationships between metamodels. This includes dependencies between elements of the GSN patternmodels and elements of the system metamodels, as well as (where multiple system models are used)the dependencies between the system metamodels.

The current version of the tool uses an interim solution for creating weaving models that involvescreating the weaving models graphically and importing them to the tool as graphML files. Futuredevelopment of the tool will include the creation of weaving models directly from the metamodels,rather than graphically.

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 55

Page 62: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

To create the weaving model graphML files, the open source yEd diagramming tool1 is used. Theweaving model is represented using nodes and edges with the following properties.

GSN Pattern Role Node

• Type = RoleBinding

System Metamodel Element Node

• Type = AADLmodelElement• properties: String ElementType={metamodel element name}, String ModelName={model

name}

GSN Pattern Role Mapping Edge

• Type = Mapping

System Metamodel Dependency Edge

• Type = metaDep• properties: path={metamodel EReferences}

The weaving model created in yEd is automatically generated as a graphML file. The graphML filemust be added to the project workspace of the MBAC program.

If no changes are made to the existing D-MILS patterns and only system models conforming tothe same metamodels are used, then the weaving model will not need to be changed by the systemdeveloper. Any changes to the patterns or to the metamodels will require the user to use yEd to updatethe weaving model. Note that changes to the system models should not normally require changes tothe weaving model.

3.4 MBAC program

The MBAC program is an Epsilon Object Language (eol) program the runs on the Eclipse platform.It is executed using a run configuration that specifies the input files. If no changes have been madeto the D-MILS patterns or to the metamodels, then the system developer will only to ensure that thesystem models for the target system are included in the run configuration. The MBAC program isprovided as an Eclipse project and requires the Epsilon plugin2 and GraphML integration driver3.The initial run configuration is included within the project.

1The yEd Graph editor is available to download from http://www.yworks.com/en/products/yfiles/yed/2http://download.eclipse.org/epsilon/interim/3http://epsilonlabs.googlecode.com/svn/trunk/org.eclipse.epsilon.emc.graphml.updatesite

Page 56 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 63: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

3.5 GSN Argument Model

The output of the MBAC tool is a GSN argument model of the assurance case argument for the targetsystem that has been instantiated using information extracted from the system models. The argumentmodel is generated as a GSNML file. This GSNML file can then be used to present information tothe user in a number of ways. Firstly, the argument model can be represented graphically as a GSNstructure. Secondly, the model can be queried in order to provide a particular view on the assurancecase. For example it is possible to just select those argument elements that remain undeveloped,requiring additional support from the system developer (these can be considered to be outstandingassurance requirements). It is also possible to create an assurance case module interface from theargument model, defining the public and away goals of the assurance case module as well as themodule’s context and assumptions. This would be particularly useful where multiple parties aredeveloping different assurance case modules. Finally an instantiation table can also be generated thatsummarises how the pattern has been instantiated in tabular form, rather than having to consult theentire argument structure.

The GSN argument model can also be used as the basis for performing verification of the assuranceargument structure, as well as validation of the argument with respect to the system models. Theseverification and validation activities have not yet been implemented and will be explored further inthe remainder of the project.

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 57

Page 64: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

4 Starlight example

In this section we describe an example automated instantiation of the D-MILS assurance case patternsfor a small example D-MILS system. The system used is the Starlight example which is described in[2]. We describe each step of the example instantiation and present a summary of the results.

4.1 GSN Pattern Models for Starlight

The GSN graphical model editor was used to create the pattern structures for the system proper-ties and composition assurance case patterns that were described in section 2.5. The editor createdGSNML files for the patterns. Figure 16 shows the part of the file created for the composition patternto illustrate the structure of the GSNML files.C:\Eclipse\workspace\GSNmetamodel\DMILSpatterns\composition1.gsnml 26 February 2015 17:02

<?xml version="1.0" encoding="UTF-8"?>

<gsnmetamodel:Case xmi:version="2.0" xmlns:xmi="http://www.omg.org/XMI" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"

xmlns:gsnmetamodel="http://gsnmetamodel/1.0">

<contains xsi:type="gsnmetamodel:GSN_Module" id="composition 1">

<ArgumentElements xsi:type="gsnmetamodel:GSN_Goal" id="Goal: propSat" tobeInstantiated="true">

<contents xsi:type="gsnmetamodel:Role" role="formal property"/>

<contents xsi:type="gsnmetamodel:Literal" literal="is satisfied in the MILS-AADL system model"/>

</ArgumentElements>

<ArgumentElements xsi:type="gsnmetamodel:GSN_Goal" id="Goal: formalVerif " tobeInstantiated="true">

<contents xsi:type="gsnmetamodel:Literal" literal="Formal verification proves that the MILS-AADL model satisfies"/>

<contents xsi:type="gsnmetamodel:Role" role="formal property"/>

</ArgumentElements>

<ArgumentElements xsi:type="gsnmetamodel:GSN_SupportedBy" hasSource="//@contains.0/@ArgumentElements.0"

hasTarget="//@contains.0/@ArgumentElements.1"/>

<ArgumentElements xsi:type="gsnmetamodel:GSN_Goal" id="Goal: verifResults" tobeInstantiated="true">

<contents xsi:type="gsnmetamodel:Literal" literal="Results of formal verification demonstrate"/>

<contents xsi:type="gsnmetamodel:Role" role="formal property"/>

</ArgumentElements>

<ArgumentElements xsi:type="gsnmetamodel:GSN_SupportedBy" hasSource="//@contains.0/@ArgumentElements.1"

hasTarget="//@contains.0/@ArgumentElements.3"/>

<ArgumentElements xsi:type="gsnmetamodel:GSN_Solution" id="Sol: verifResults">

<contents xsi:type="gsnmetamodel:Role" role="formal verification results for formal property"/>

</ArgumentElements>

<ArgumentElements xsi:type="gsnmetamodel:GSN_SupportedBy" hasSource="//@contains.0/@ArgumentElements.3"

hasTarget="//@contains.0/@ArgumentElements.5"/>

<ArgumentElements xsi:type="gsnmetamodel:GSN_ContextAsAssertion" id="Con: components" tobeInstantiated="true">

<contents xsi:type="gsnmetamodel:Literal" literal="trusted software components: "/>

<contents xsi:type="gsnmetamodel:Role" role="trusted software components"/>

</ArgumentElements>

<ArgumentElements xsi:type="gsnmetamodel:GSN_InContextOf" hasSource="//@contains.0/@ArgumentElements.3"

hasTarget="//@contains.0/@ArgumentElements.7"/>

<ArgumentElements xsi:type="gsnmetamodel:GSN_ContextAsAssertion" id="Con: enviroProps" tobeInstantiated="true">

<contents xsi:type="gsnmetamodel:Literal" literal="assumed environmental properties:"/>

<contents xsi:type="gsnmetamodel:Role" role="assumed environmental properties"/>

</ArgumentElements>

<ArgumentElements xsi:type="gsnmetamodel:GSN_InContextOf" hasSource="//@contains.0/@ArgumentElements.3"

hasTarget="//@contains.0/@ArgumentElements.9"/>

<ArgumentElements xsi:type="gsnmetamodel:GSN_ContextAsAssertion" id="Con: platformProps" tobeInstantiated="true">

<contents xsi:type="gsnmetamodel:Literal" literal="properties of D-MILS platform:"/>

-1-

Figure 16: GSNML file for the composition assurance case pattern

Page 58 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 65: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

4.2 Starlight System Model

The model used to instantiate the patterns was the MILS-AADL specification for the Starlight system.The specification is taken as input to the MBAC tool as an XML file (an extract is shown in figure17).

The corresponding metamodel for the MILS-AADL model was created by extending the existingAADL metamodel to include the required MILS-specific elements. Figures 18 and 19 show theseextensions.

4.3 Weaving Model

The weaving model used for the instantiation is shown graphically in figure 20. The rectanglesare elements of the system metamodel (MILS-AADL metamodel) and the rounded nodes are roleelements in the D-MILS assurance case pattern models. Two types of connector are shown:

• the solid lines represent connections that exist between elements in the MILS-AADL meta-model. These connections include a definition of a path attribute that defines the reference pathfrom the source to the target element in the metamodel.

• the dotted lines represent dependencies between the assurance argument roles and the meta-model elements. These connections can include the definition of a constraint on the selectionof model elements of the defined type.

4.4 Starlight Assurance Argument Models

Using the models defined above as input to the MBAC tool the argument files were generated for thesystem properties and composition assurance case modules. These outputs are described below.

4.4.1 Starlight System Properties Assurance Argument Model

The generated gsnml file for the instantiated system properties module argument is provided in Ap-pendix A. This output is represented graphically as a GSN structure in B.

From this instantiation the following assurance claims still requiring support are identified. Thesatisfaction of these claims are assurance obligations on the system properties assurance case module.

• The formal properties are sufficient to address the defined D-MILS system properties• Assumed environmental properties:• ‘true’ is met• ‘always ((cmd) implies then ((return) releases (not ((cmd or switch_to_high or

switch_to_low)))))’ is met• ‘always (((cmd) implies then ((return) releases (not ((cmd or switch_to_high or

switch_to_low))))) and (((last_data(cmd) less high_bound) ) implies ( (not (switch_to_low))since (switch_to_high) ))’ is met

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 59

Page 66: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

C:\Users\rhawkins\Files\Epsilon\eclipse-epsilon-1.2-win32-x86_64\workspace\MBAC\starlight.aaxl 27 February 2015 16:58

<dataConnection name="display2user"

src="//@aadlPackage.0/@aadlPublic/@systemType.1/@features/@dataPort.1"

dst="//@aadlPackage.0/@aadlPublic/@subjectType.0/@features/@dataPort.1">

</dataConnection>

</connections>

</systemImpl>

<systemType name="starlight" implementations="//@aadlPackage.0/@aadlPublic/@systemImpl.1">

<features>

<dataPort name="cmd" direction="in"/>

<eventPort name="switch_to_high" direction="in"/>

<eventPort name="switch_to_low" direction="in"/>

<dataPort name="return" direction="out"/>

<dataPort name="outL" />

</features>

<annotations>

<contract name="ev_functional_prop" >

<technique name="ocra" />

<assumption name="true" />

<guarantee name="always ( {cmd} implies in the future {return}" />

</contract>

<contract name="data_functional_prop" >

<technique name="ocra" />

<assumption name="always ( {cmd} implies then ( {return} releases (not ( {cmd or

switch_to_high or switch_to_low} )) ))" />

<guarantee name="always ( {return} implies {last_data(return) =

computation(last_data(cmd))} )" />

</contract>

<contract name="secure_prop" >

<technique name="ocra" />

<assumption name="always (

( {cmd} implies then ( {return} releases (not ( {cmd or switch_to_high or

switch_to_low} )) ))

and

( ( {last_data(cmd) less high_bound} ) implies ( (not {switch_to_low})

since {switch_to_high} )))" />

<guarantee name="any" value="always ({outL greater high_bound})" />

</contract>

</annotations>

</systemType>

<systemImpl name="starlight.impl" compType="//@aadlPackage.0/@aadlPublic/@systemType.1">

<subcomponents>

<subjectSubcomponent name="dispatch"

classifier="//@aadlPackage.0/@aadlPublic/@subjectType.1"/>

<subjectSubcomponent name="high"

classifier="//@aadlPackage.0/@aadlPublic/@subjectType.2"/>

<subjectSubcomponent name="low"

classifier="//@aadlPackage.0/@aadlPublic/@subjectType.3"/>

</subcomponents>

<connections>

-2-

Figure 17: XML file for the MILS-AADL specification of the Starlight system

Page 60 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 67: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

ComponentType

SubjectTypeSubjectImpl

implementations

ComponentImpl

SubjectClassifier

ComponentClassifier

SubjectSubcomponent

Subcomponent

SystemSubcomponents

subjectSubcomponent

AADLPackageSection

subjectType subjectImpl

compType

SystemTypeSystemImpl

subcomponents

implementations

compType

classifier

Figure 18: AADL metamodel extended to include Subjects

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 61

Page 68: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

Contracts

Annotations

Contract

Annotation

PropertyHolder

SubjectTypeSubjectImpl

annotations

annotations

SystemType

annotations

contract

SystemImpl

annotations

Assumption

Guarantee

assumption

guarantee

AObject

Technique

technique

Figure 19: AADL metamodel extended to include Contract definitions

Page 62 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 69: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

Figure 20: Graphical representation of the weaving model used to instantiate the Starlight systemassurance argument

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 63

Page 70: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

The following assurance claims requiring support in other modules are identfied. The satisfaction ofthese claims are assurance obligations on the relevant assurance case module.

Composition:

• ‘always ( (cmd) implies in the future (return)’ is satisfied in the MILS-AADL system model• ‘always ( (return) implies (last_data(return) = computation(last_data(cmd))) )’ is satisfied in

the MILS-AADL system model• ‘any’ is satisfied in the MILS-AADL system model

Trusted Software Components:

• Usubject correctly implements the MILS-AADL implementation specification• Dsubject correctly implements the MILS-AADL implementation specification• Lsubject correctly implements the MILS-AADL implementation specification• Hsubject correctly implements the MILS-AADL implementation specification

D-MILS Platform:

• D-MILS platform guarantees required properties

4.4.2 Starlight Composition Assurance Argument Model

The generated gsnml file for the instantiated composition module argument is provided in AppendixC. This output is represented graphically as a GSN structure in D.

From this instantiation the following assurance claims still requiring support are identified. Thesatisfaction of these claims are assurance obligations on the system properties assurance case module.

• ocra formal model validation demonstrates it is correct w.r.t. the MILS-AADL model• ocra formal model validation demonstrates it is correct w.r.t. the MILS-AADL model• ocra formal model validation demonstrates it is correct w.r.t. the MILS-AADL model

Note that the instantiation has resulted in three identical claims, since in each case the same technique(ocra) has been used. These three claims correspond to a single assurance obligation since all threeclaims can be supported in an identical manner.

The following assurance claims requiring support in other modules are identfied. The satisfaction ofthese claims are assurance obligations on the relevant assurance case module.

{technique} Tool:

• ocra translation tool is sufficiently trustworthy• ocra translation tool is sufficiently trustworthy• ocra translation tool is sufficiently trustworthy• ocra tool is sufficiently trustworthy• ocra tool is sufficiently trustworthy• ocra tool is sufficiently trustworthy

Note that the instantiation has resulted in identical claims, since only the Ocra technique is used.These claims correspond to two different assurance obligations.

Page 64 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 71: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

A Starlight system properties GSNML model

<?xml version="1.0" encoding="UTF-8" standalone="no"?><Argumentation>

<ArgumentElements id="Goal: sysProps.0" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Goal"><contents literal="required properties are enforced" xsitype="gsnmetamodel:Literal"/><contents role="sys" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Goal: sysProps.0" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Goal">

<contents literal="required properties are enforced" xsitype="gsnmetamodel:Literal"/><contents role="starlight" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Con: sysProps" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_ContextAsReference">

<contents literal="required properties:" xsitype="gsnmetamodel:Literal"/><contents role="Any command sent between a switch_to_high (or the beginning) and a switch_to_low event shouldnot be visible to the low-security subject" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements hasSource="Goal: sysProps" hasTarget="Con: sysDescr" id="RCon: sysDescr.0" xsitype="gsnmetamodel:GSN_InContextOf"/><ArgumentElements id="Con: sysDescr.0" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_ContextAsReference">

<contents literal="D-MILS System: defined by" xsitype="gsnmetamodel:Literal"/><contents role="Starlight MILS AADL model" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Strat: sysSecurity" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Strategy">

<contents literal="Argument over each safety or security property" xsitype="gsnmetamodel:Literal"/><contents role="" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Ass: sysProps" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Goal">

<contents literal="The defined required properties are complete and correct w.r.t. system threats, vulnerabilities and hazards"xsitype="gsnmetamodel:Literal"/><contents role="" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Goal: propEnforced.0.1" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Goal">

<contents literal="is enforced" xsitype="gsnmetamodel:Literal"/><contents role="Any command sent between a switch_to_high (or the beginning) and a switch_to_low event should notbe visible to the low-security subject" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Strat: compVerif" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Strategy">

<contents literal="Argument over each formal property relating to" xsitype="gsnmetamodel:Literal"/><contents role="" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Con: formalProps" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_ContextAsReference">

<contents literal="formal system properties relating to D-MILS system property:" xsitype="gsnmetamodel:Literal"/><contents role="" xsitype="gsnmetamodel:Role"/><contents tag="--instantiation error: No role binding specified for role: --"/>

</ArgumentElements><ArgumentElements id="Goal: propSuff" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Goal">

<contents literal="The formal properties are sufficient to address the defined D-MILS system properties" xsitype="gsnmetamodel:Literal"/><contents role="" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Goal: propAdd.1.1" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Goal">

<contents literal="is satisfied through the realisation of the MILS-AADL system model" xsitype="gsnmetamodel:Literal"/><contents role="always ( {cmd} implies in the future {return}" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements hasSource="Goal: propAdd" hasTarget="Goal: propSat_Composition" id="RGoal: propSat_Composition.1" xsitype="gsnmetamodel:GSN_SupportedBy"/><ArgumentElements id="Goal: propSat_Composition.1" modRef="Composition" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_AwayGoal">

<contents literal="is satisfied in the MILS-AADL system model" xsitype="gsnmetamodel:Literal"/><contents role="always ( {cmd} implies in the future {return}" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements hasSource="Goal: propAdd" hasTarget="Goal: propSat_Composition" id="RGoal: propSat_Composition.1" xsitype="gsnmetamodel:GSN_SupportedBy"/><ArgumentElements id="Goal: propSat_Composition.1" modRef="Composition" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_AwayGoal">

<contents literal="is satisfied in the MILS-AADL system model" xsitype="gsnmetamodel:Literal"/><contents role="always ( {return} implies {last_data(return) = computation(last_data(cmd))} )" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements hasSource="Goal: propAdd" hasTarget="Goal: propSat_Composition" id="RGoal: propSat_Composition.1" xsitype="gsnmetamodel:GSN_SupportedBy"/><ArgumentElements id="Goal: propSat_Composition.1" modRef="Composition" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_AwayGoal">

<contents literal="is satisfied in the MILS-AADL system model" xsitype="gsnmetamodel:Literal"/><contents role="any" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements hasSource="Goal: propAdd" hasTarget="Goal: propsSat" id="RGoal: propsSat.1" xsitype="gsnmetamodel:GSN_SupportedBy"/><ArgumentElements id="Goal: propsSat.1" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Goal">

<contents literal="is addressed through the realisation of the MILS-AADL system model" xsitype="gsnmetamodel:Literal"/><contents role="always ( {cmd} implies in the future {return}" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements hasSource="Goal: propAdd" hasTarget="Goal: propsSat" id="RGoal: propsSat.1" xsitype="gsnmetamodel:GSN_SupportedBy"/><ArgumentElements id="Goal: propsSat.1" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Goal">

<contents literal="is addressed through the realisation of the MILS-AADL system model" xsitype="gsnmetamodel:Literal"/><contents role="always ( {return} implies {last_data(return) = computation(last_data(cmd))} )" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements hasSource="Goal: propAdd" hasTarget="Goal: propsSat" id="RGoal: propsSat.1" xsitype="gsnmetamodel:GSN_SupportedBy"/><ArgumentElements id="Goal: propsSat.1" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Goal">

<contents literal="is addressed through the realisation of the MILS-AADL system model" xsitype="gsnmetamodel:Literal"/><contents role="any" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Start: SysSecurity" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Strategy">

<contents literal="Argument over the required properties of the components and the platform" xsitype="gsnmetamodel:Literal"/><contents role="" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Goal:SwComponents" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Goal">

<contents literal="Trusted software components correctly implement the MILS-AADL implmentation specification" xsitype="gsnmetamodel:Literal"/>

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 65

Page 72: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

<contents role="" xsitype="gsnmetamodel:Role"/></ArgumentElements><ArgumentElements id="Goal: platProp_D-MILS PLatform" modRef="DMILS Platform" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_AwayGoal">

<contents literal="D-MILS platform guarantees required properties" xsitype="gsnmetamodel:Literal"/><contents role="" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Con: platformProps" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_ContextAsReference">

<contents literal="properties of D-MILS platform:" xsitype="gsnmetamodel:Literal"/><contents role="" xsitype="gsnmetamodel:Role"/><contents tag="--instantiation error: No role binding specified for role: --"/>

</ArgumentElements><ArgumentElements id="Goal: envAss" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Goal">

<contents literal="All environmental assumptions are met" xsitype="gsnmetamodel:Literal"/><contents role="" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Con: enviroProps" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_ContextAsReference">

<contents literal="assumed environmental properties:" xsitype="gsnmetamodel:Literal"/><contents role="" xsitype="gsnmetamodel:Role"/><contents tag="--instantiation error: No role binding specified for role: --"/>

</ArgumentElements><ArgumentElements id="Goal: sysImp_Implementation" modRef="Implementation" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_AwayGoal">

<contents literal="The MILS-AADL model is faithfully implemented" xsitype="gsnmetamodel:Literal"/><contents role="" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Strat: envAss" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Strategy">

<contents literal="Argument over each assumed environmental property" xsitype="gsnmetamodel:Literal"/><contents role="" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Goal: sysProp.1.1" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Goal">

<contents literal="is met" xsitype="gsnmetamodel:Literal"/><contents role="true" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Goal: sysProp.1.2" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Goal">

<contents literal="is met" xsitype="gsnmetamodel:Literal"/><contents role="always ( {cmd} implies then ( {return} releases (not ( {cmd or switch_to_high or switch_to_low} )) ))" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Goal: sysProp.1.3" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Goal">

<contents literal="is met" xsitype="gsnmetamodel:Literal"/><contents role="always (( {cmd} implies then ( {return} releases (not ( {cmd or switch_to_high or switch_to_low} )) ))and ( ( {last_data(cmd) less high_bound} ) implies ( (not {switch_to_low}) since {switch_to_high} )))" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Strat: swComponents" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Strategy">

<contents literal="Argument over each trusted software component" xsitype="gsnmetamodel:Literal"/><contents role="" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Con: components" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_ContextAsReference">

<contents literal="trusted software components:" xsitype="gsnmetamodel:Literal"/><contents role="" xsitype="gsnmetamodel:Role"/><contents tag="--instantiation error: No role binding specified for role: --"/>

</ArgumentElements><ArgumentElements id="Goal: sWcompProp_Trusted Software Component.1" modRef="Trusted Software Component" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_AwayGoal">

<contents literal="correctly implements the MILS-AADL implementation specification" xsitype="gsnmetamodel:Literal"/><contents role="Usubject" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Goal: sWcompProp_Trusted Software Component.1" modRef="Trusted Software Component" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_AwayGoal">

<contents literal="correctly implements the MILS-AADL implementation specification" xsitype="gsnmetamodel:Literal"/><contents role="Dsubject" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Goal: sWcompProp_Trusted Software Component.1" modRef="Trusted Software Component" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_AwayGoal">

<contents literal="correctly implements the MILS-AADL implementation specification" xsitype="gsnmetamodel:Literal"/><contents role="Lsubject" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Goal: sWcompProp_Trusted Software Component.1" modRef="Trusted Software Component" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_AwayGoal">

<contents literal="correctly implements the MILS-AADL implementation specification" xsitype="gsnmetamodel:Literal"/><contents role="Hsubject" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Goal: propAdd.1.2" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Goal">

<contents literal="is satisfied through the realisation of the MILS-AADL system model" xsitype="gsnmetamodel:Literal"/><contents role="always ( {return} implies {last_data(return) = computation(last_data(cmd))} )" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Goal: propAdd.1.3" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Goal">

<contents literal="is satisfied through the realisation of the MILS-AADL system model" xsitype="gsnmetamodel:Literal"/><contents role="any" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements hasSource="Goal: sysProps" hasTarget="Con: sysProps" id="R0" xsitype="gsnmetamodel:GSN_InContextOf"/><ArgumentElements hasSource="Goal: sysProps" hasTarget="Con: sysDescr" id="R1" xsitype="gsnmetamodel:GSN_InContextOf"/><ArgumentElements hasSource="Goal: sysProps" hasTarget="Strat: sysSecurity" id="R2" xsitype="gsnmetamodel:GSN_SupportedBy"/><ArgumentElements hasSource="Strat: sysSecurity" hasTarget="Ass: sysProps" id="R3" xsitype="gsnmetamodel:GSN_InContextOf"/><ArgumentElements hasSource="Strat: sysSecurity" hasTarget="Goal: propEnforced" id="R4" xsitype="gsnmetamodel:GSN_SupportedBy"/>

</Argumentation>

Page 66 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 73: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

B Starlight System Properties Module GSN Structure

Goal: sysProps.0

starlight requiredproperties are enforced

Con: sysDescr

D-MILS System: definedby Starlight MILS AADLmodel

Con: sysProps

required properties: Anycommand sent between aswitch_to_high (or the beginning)and a switch_to_low event shouldnot be visible to the low-securitysubject

Strat: sysSecurity

Argument over eachsafety or securityproperty

A

Ass: sysProps

The defined required propertiesare complete and correct w.r.t.system threats, vulnerabilitiesand hazards

Goal: propEnforced.0.1

Any command sent between aswitch_to_high (or the beginning) and aswitch_to_low event should not be visibleto the low-security subject is enforced

Strat: compVerif

Argument over eachformal property relating tothe system property

Goal: propAdd.1.1

always ( {cmd} implies in the future{return} is satisfied through therealisation of the MILS-AADL systemmodel

Goal: propAdd.1.2

always ( {return} implies{last_data(return) =computation(last_data(cmd))} ) issatisfied through the realisation of theMILS-AADL system model

Goal: propAdd.1.3

any is satisfied through therealisation of the MILS-AADLsystem model

Goal: propSuff

The formal properties aresufficient to address thedefined D-MILS systemproperties

Goal: propSat_Composition

always ( {cmd} implies in the future {return}is satisfied in the MILS-AADL system model

Composition

Goal: propSat _Composition

always ( {return} implies {last_data(return) =computation(last_data(cmd))} ) is satisfiedin the MILS-AADL system model

Composition

Goal.propSat_Composition.1_Composition

any is satisfied in the MILS-AADLsystem model

Composition

Goal: propsSat.1

always ( {cmd} implies in the future{return} is addressed through therealisation of the MILS-AADL systemmodel

Goal: propsSat. 1

always ( {return} implies{last_data(return) =computation(last_data(cmd))} isaddressed through the realisation of theMILS-AADL system model

Goal: propsSat.1

any is addressed through therealisation of the MILS-AADLsystem model

Start: SysSecurity

Argument over therequired properties of thecomponents and theplatform

Goal:SwComponents

Trusted software componentscorrectly implement the MILS-AADL implmentation specification

Strat: swComponents

Argument over eachtrusted softwarecomponent

Con: components

trusted softwarecomponents:

Goal: sWcompProp_Trusted SoftwareComponent

Usubject correctly implements the MILS-AADL implementation specification

Trusted Software Component

Goal; sWcompProp _Trusted SoftwareComponent

Dsubject correctly implements the MILS-AADL implementation specification

Trusted Software Component

Goal, sWcompProp _Trusted SoftwareComponent

Lsubject correctly implements the MILS-AADL implementation specification

Trusted Software Component

Goal. sWcompProp _Trusted SoftwareComponent

Hsubject correctly implements the MILS-AADL implementation specification

Trusted Software Component

Goal: platProp_D-MILS PLatform _D-MILSPlatform

D-MILS platform guarantees requiredproperties

D-MILS Platform

Con: platformProps

properties of D-MILSplatform: --instantiationerror: No role bindingspecified for role: --

Goal: envAss

All environmentalassumptions are met

Strat: envAss

Argument over eachassumed environmentalproperty

Goal: sysProp.1.1

true is met

Goal: sysProp.1.1

always ( {cmd} implies then ({return} releases (not ( {cmd orswitch_to_high or switch_to_low} ))) is met

Goal: sysProp.1.1

always (( {cmd} implies then ( {return}releases (not ( {cmd or switch_to_high orswitch_to_low} )) )) and ( ( {last_data(cmd)less high_bound} ) implies ( (not{switch_to_low}) since {switch_to_high} )))is met

Goal: sysImp _Implementation

The MILS-AADL model is faithfullyimplemented

Implementation

Figure 21: Starlight system properties module GSN structure

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 67

Page 74: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

C Starlight Composition GSNML model

<?xml version="1.0" encoding="UTF-8" standalone="no"?><Argumentation>

<ArgumentElements id="Goal: propSat.0" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Goal"><contents literal="is satisfied in the MILS-AADL system model" xsitype="gsnmetamodel:Literal"/><contents role="always ( {cmd} implies in the future {return}" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Goal: propSat.0" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Goal">

<contents literal="is satisfied in the MILS-AADL system model" xsitype="gsnmetamodel:Literal"/><contents role="always ( {return} implies {last_data(return) = computation(last_data(cmd))} )" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Goal: propSat.0" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Goal">

<contents literal="is satisfied in the MILS-AADL system model" xsitype="gsnmetamodel:Literal"/><contents role="any" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements hasSource="Goal: propSat" hasTarget="Goal: formalVerif" id="RGoal: formalVerif.0" xsitype="gsnmetamodel:GSN_SupportedBy"/><ArgumentElements id="Goal: formalVerif.0" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Goal">

<contents literal="Formal verification proves that the MILS-AADL model satisfies" xsitype="gsnmetamodel:Literal"/><contents role="always ( {cmd} implies in the future {return}" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements hasSource="Goal: propSat" hasTarget="Goal: formalVerif" id="RGoal: formalVerif.0" xsitype="gsnmetamodel:GSN_SupportedBy"/><ArgumentElements id="Goal: formalVerif.0" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Goal">

<contents literal="Formal verification proves that the MILS-AADL model satisfies" xsitype="gsnmetamodel:Literal"/><contents role="always ( {return} implies {last_data(return) = computation(last_data(cmd))} )" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements hasSource="Goal: propSat" hasTarget="Goal: formalVerif" id="RGoal: formalVerif.0" xsitype="gsnmetamodel:GSN_SupportedBy"/><ArgumentElements id="Goal: formalVerif.0" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Goal">

<contents literal="Formal verification proves that the MILS-AADL model satisfies" xsitype="gsnmetamodel:Literal"/><contents role="any" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements hasSource="Goal: formalVerif" hasTarget="Goal: verifResults" id="RGoal: verifResults.0" xsitype="gsnmetamodel:GSN_SupportedBy"/><ArgumentElements id="Goal: verifResults.0" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Goal">

<contents literal="Results of formal verification demonstrate" xsitype="gsnmetamodel:Literal"/><contents role="always ( {cmd} implies in the future {return}" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements hasSource="Goal: formalVerif" hasTarget="Goal: verifResults" id="RGoal: verifResults.0" xsitype="gsnmetamodel:GSN_SupportedBy"/><ArgumentElements id="Goal: verifResults.0" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Goal">

<contents literal="Results of formal verification demonstrate" xsitype="gsnmetamodel:Literal"/><contents role="always ( {return} implies {last_data(return) = computation(last_data(cmd))} )" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements hasSource="Goal: formalVerif" hasTarget="Goal: verifResults" id="RGoal: verifResults.0" xsitype="gsnmetamodel:GSN_SupportedBy"/><ArgumentElements id="Goal: verifResults.0" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Goal">

<contents literal="Results of formal verification demonstrate" xsitype="gsnmetamodel:Literal"/><contents role="any" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Sol: verifResults" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Solution">

<contents literal="null" xsitype="gsnmetamodel:Literal"/><contents role="" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements hasSource="Goal: verifResults" hasTarget="Con: components" id="RCon: components.0" xsitype="gsnmetamodel:GSN_InContextOf"/><ArgumentElements id="Con: components.0" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_ContextAsReference">

<contents literal="trusted software component:" xsitype="gsnmetamodel:Literal"/><contents role="Usubject" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements hasSource="Goal: verifResults" hasTarget="Con: components" id="RCon: components.0" xsitype="gsnmetamodel:GSN_InContextOf"/><ArgumentElements id="Con: components.0" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_ContextAsReference">

<contents literal="trusted software component:" xsitype="gsnmetamodel:Literal"/><contents role="Dsubject" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements hasSource="Goal: verifResults" hasTarget="Con: components" id="RCon: components.0" xsitype="gsnmetamodel:GSN_InContextOf"/><ArgumentElements id="Con: components.0" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_ContextAsReference">

<contents literal="trusted software component:" xsitype="gsnmetamodel:Literal"/><contents role="Lsubject" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements hasSource="Goal: verifResults" hasTarget="Con: components" id="RCon: components.0" xsitype="gsnmetamodel:GSN_InContextOf"/><ArgumentElements id="Con: components.0" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_ContextAsReference">

<contents literal="trusted software component:" xsitype="gsnmetamodel:Literal"/><contents role="Hsubject" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements hasSource="Goal: verifResults" hasTarget="Con: enviroProps" id="RCon: enviroProps.0" xsitype="gsnmetamodel:GSN_InContextOf"/><ArgumentElements id="Con: enviroProps.0" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_ContextAsReference">

<contents literal="assumed environmental properties:" xsitype="gsnmetamodel:Literal"/><contents role="true" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements hasSource="Goal: verifResults" hasTarget="Con: enviroProps" id="RCon: enviroProps.0" xsitype="gsnmetamodel:GSN_InContextOf"/><ArgumentElements id="Con: enviroProps.0" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_ContextAsReference">

<contents literal="assumed environmental properties:" xsitype="gsnmetamodel:Literal"/><contents role="always ( {cmd} implies then ( {return} releases (not ( {cmd or switch_to_high or switch_to_low} )) ))" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements hasSource="Goal: verifResults" hasTarget="Con: enviroProps" id="RCon: enviroProps.0" xsitype="gsnmetamodel:GSN_InContextOf"/><ArgumentElements id="Con: enviroProps.0" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_ContextAsReference">

<contents literal="assumed environmental properties:" xsitype="gsnmetamodel:Literal"/><contents role="always ( ( {cmd} implies then ( {return} releases (not ( {cmd or switch_to_high or switch_to_low} )) )) and ( ( {last_data(cmd) less high_bound} ) implies ( (not {switch_to_low}) since {switch_to_high} )))" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Con: platformProps" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_ContextAsReference">

<contents literal="properties of D-MILS platform:" xsitype="gsnmetamodel:Literal"/><contents role="" xsitype="gsnmetamodel:Role"/><contents tag="--instantiation error: No role binding specified for role: --"/>

Page 68 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 75: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

</ArgumentElements><ArgumentElements id="Goal: formalConf" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Goal">

<contents literal="There is sufficient confidence in the formal verification results" xsitype="gsnmetamodel:Literal"/><contents role="" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements hasSource="Goal: formalConf" hasTarget="Goal: verification" id="RGoal: verification.0" xsitype="gsnmetamodel:GSN_SupportedBy"/><ArgumentElements id="Goal: verification.0" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Goal">

<contents literal="gives trustworthy results" xsitype="gsnmetamodel:Literal"/><contents role="ocra" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements hasSource="Goal: formalConf" hasTarget="Goal: verification" id="RGoal: verification.0" xsitype="gsnmetamodel:GSN_SupportedBy"/><ArgumentElements id="Goal: verification.0" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Goal">

<contents literal="gives trustworthy results" xsitype="gsnmetamodel:Literal"/><contents role="ocra" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements hasSource="Goal: formalConf" hasTarget="Goal: verification" id="RGoal: verification.0" xsitype="gsnmetamodel:GSN_SupportedBy"/><ArgumentElements id="Goal: verification.0" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Goal">

<contents literal="gives trustworthy results" xsitype="gsnmetamodel:Literal"/><contents role="ocra" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Goal: verifTool_technique Tool.0.1" modRef="technique Tool" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_AwayGoal">

<contents literal="tool is sufficiently trustworthy" xsitype="gsnmetamodel:Literal"/><contents role="ocra" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Goal: verifTool_technique Tool.0.2" modRef="technique Tool" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_AwayGoal">

<contents literal="tool is sufficiently trustworthy" xsitype="gsnmetamodel:Literal"/><contents role="ocra" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Goal: verifTool_technique Tool.0.3" modRef="technique Tool" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_AwayGoal">

<contents literal="tool is sufficiently trustworthy" xsitype="gsnmetamodel:Literal"/><contents role="ocra" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Goal: formalModel.0" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Goal">

<contents literal="formal model is a correct representation of the MILS-AADL model" xsitype="gsnmetamodel:Literal"/><contents role="ocra" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Goal: formalModel.0" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Goal">

<contents literal="formal model is a correct representation of the MILS-AADL model" xsitype="gsnmetamodel:Literal"/><contents role="ocra" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Goal: formalModel.0" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Goal">

<contents literal="formal model is a correct representation of the MILS-AADL model" xsitype="gsnmetamodel:Literal"/><contents role="ocra" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Con: formalModel" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_ContextAsReference">

<contents literal="formal model:" xsitype="gsnmetamodel:Literal"/><contents role="" xsitype="gsnmetamodel:Role"/><contents tag="--instantiation error: No role binding specified for role: --"/>

</ArgumentElements><ArgumentElements id="Strat: formalModel" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Strategy">

<contents literal="Argument over the translation from MILS-AADL to the formal representation" xsitype="gsnmetamodel:Literal"/><contents role="" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Goal: validate.0" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Goal">

<contents literal="formal model demonstrates it is correct w.r.t. the MILS-AADL model" xsitype="gsnmetamodel:Literal"/><contents role="ocra" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Goal: validate.0" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Goal">

<contents literal="formal model demonstrates it is correct w.r.t. the MILS-AADL model" xsitype="gsnmetamodel:Literal"/><contents role="ocra" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Goal: validate.0" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_Goal">

<contents literal="formal model demonstrates it is correct w.r.t. the MILS-AADL model" xsitype="gsnmetamodel:Literal"/><contents role="ocra" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Goal: transTool_technique Tool.0" modRef="technique Tool" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_AwayGoal">

<contents literal="translation tool is sufficiently trustworthy" xsitype="gsnmetamodel:Literal"/><contents role="ocra" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Goal: transTool_technique Tool.0" modRef="technique Tool" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_AwayGoal">

<contents literal="translation tool is sufficiently trustworthy" xsitype="gsnmetamodel:Literal"/><contents role="ocra" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements id="Goal: transTool_technique Tool.0" modRef="technique Tool" toBeInstantiated="false" xsitype="gsnmetamodel:GSN_AwayGoal">

<contents literal="translation tool is sufficiently trustworthy" xsitype="gsnmetamodel:Literal"/><contents role="ocra" xsitype="gsnmetamodel:Role"/>

</ArgumentElements><ArgumentElements hasSource="Goal: propSat" hasTarget="Goal: formalVerif" id="R0" xsitype="gsnmetamodel:GSN_SupportedBy"/><ArgumentElements hasSource="Goal: formalVerif" hasTarget="Goal: verifResults" id="R1" xsitype="gsnmetamodel:GSN_SupportedBy"/><ArgumentElements hasSource="Goal: verifResults" hasTarget="Sol: verifResults" id="R2" xsitype="gsnmetamodel:GSN_SupportedBy"/><ArgumentElements hasSource="Goal: verifResults" hasTarget="Con: components" id="R3" xsitype="gsnmetamodel:GSN_InContextOf"/><ArgumentElements hasSource="Goal: verifResults" hasTarget="Con: enviroProps" id="R4" xsitype="gsnmetamodel:GSN_InContextOf"/><ArgumentElements hasSource="Goal: verifResults" hasTarget="Con: platformProps" id="R5" xsitype="gsnmetamodel:GSN_InContextOf"/><ArgumentElements hasSource="Goal: formalVerif" hasTarget="Goal: formalConf" id="R6" xsitype="gsnmetamodel:GSN_SupportedBy"/><ArgumentElements hasSource="Goal: formalConf" hasTarget="Goal: verification" id="R7" xsitype="gsnmetamodel:GSN_SupportedBy"/><ArgumentElements hasSource="Goal: verification" hasTarget="Goal: verifTool_technique Tool" id="R8" xsitype="gsnmetamodel:GSN_SupportedBy"/><ArgumentElements hasSource="Goal: formalConf" hasTarget="Goal: formalModel" id="R9" xsitype="gsnmetamodel:GSN_SupportedBy"/><ArgumentElements hasSource="Goal: formalModel" hasTarget="Con: formalModel" id="R10" xsitype="gsnmetamodel:GSN_InContextOf"/><ArgumentElements hasSource="Goal: formalModel" hasTarget="Strat: formalModel" id="R11" xsitype="gsnmetamodel:GSN_SupportedBy"/><ArgumentElements hasSource="Strat: formalModel" hasTarget="Goal: validate" id="R12" xsitype="gsnmetamodel:GSN_SupportedBy"/>

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 69

Page 76: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

<ArgumentElements hasSource="Strat: formalModel" hasTarget="Goal: transTool_technique Tool" id="R13" xsitype="gsnmetamodel:GSN_SupportedBy"/></Argumentation>

Page 70 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 77: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

D Starlight Composition Module GSN Structure

Go

al:

pro

pSa

t.0

alw

ays

({c

md

}im

plie

sin

the

futu

re{r

etu

rn}

issa

tisf

ied

inth

eM

ILS-

AA

DL

syst

emm

od

el

Go

al:

pro

pSa

t.0

alw

ays

({r

etu

rn}

imp

lies

{las

t_d

ata(

retu

rn)

=co

mp

uta

tio

n(l

ast_

dat

a(cm

d))

})

issa

tisf

ied

inth

eM

ILS-

AA

DL

syst

em

mo

del

Go

al.

pro

pSa

t.0

any

issa

tisf

ied

inth

eM

ILS-

AA

DL

syst

emm

od

el

Go

al:f

orm

alV

erif

.0

Form

alve

rifi

cati

on

pro

ves

that

the

MIL

S-A

AD

Lm

od

els

atis

fie

sal

way

s(

{cm

d}

imp

lies

inth

efu

ture

{ret

urn

}

Go

al;f

orm

alV

eri

f.0

Form

alve

rifi

cati

on

pro

ves

that

the

MIL

S-A

AD

Lm

od

els

atis

fie

sal

way

s(

{ret

urn

}im

plie

s{l

ast_

dat

a(re

turn

)=

com

pu

tati

on

(las

t_d

ata(

cmd

))}

)

Go

al;

form

alV

eri

f.0

Form

alve

rifi

cati

on

pro

ves

that

the

MIL

S-A

AD

Lm

od

elsa

tisf

ies

any

Go

al:

veri

fRe

sult

s.0

Res

ult

so

ffo

rmal

veri

fica

tio

nd

em

on

stra

teal

way

s(

{cm

d}

imp

lies

inth

efu

ture

{re

turn

}

Go

al;v

eri

fRes

ult

s.0

Re

sult

so

ffo

rmal

veri

fica

tio

nd

emo

nst

rate

alw

ays

({r

etu

rn}

imp

lies

{las

t_d

ata(

retu

rn)

=co

mp

uta

tio

n(l

ast_

dat

a(cm

d))

})

Go

al;

veri

fRe

sult

s.0

Res

ult

so

ffo

rmal

veri

fica

tio

nd

em

on

stra

tean

y

So

l:v

eri

fResu

lts

null

Co

n;

com

po

ne

nts

.0

tru

sted

soft

war

eco

mp

on

ent:

Dsu

bje

ct

Co

n;

com

po

ne

nts

.0

tru

ste

dso

ftw

are

com

po

nen

t:Ls

ub

ject

Co

n:

com

po

ne

nts

.0

tru

sted

soft

war

eco

mp

on

ent:

Hsu

bje

ct

So

l;veri

fResu

lts

null

So

l:v

eri

fRe

su

lts

null

Go

al:

form

alC

on

f

Th

ere

issu

ffic

ien

tco

nfi

de

nce

inth

efo

rmal

veri

fica

tio

nre

sult

s

Go

al:

veri

fica

tio

n.0

ocr

agi

ves

tru

stw

ort

hy

resu

lts

Go

al;f

orm

alC

on

f

Ther

eis

suff

icie

nt

con

fid

ence

inth

efo

rmal

veri

fica

tio

nre

sult

s

Go

al:f

orm

alC

on

f

The

reis

suff

icie

nt

con

fid

ence

inth

efo

rmal

veri

fica

tio

nre

sult

s

Go

al;

veri

fica

tio

n.0

ocr

agi

ves

tru

stw

ort

hy

resu

lts

Go

al:v

eri

fica

tio

n.0

ocr

agi

ves

tru

stw

ort

hy

resu

lts

Go

al:v

erif

Too

l_te

chn

iqu

eT

oo

l.0

.1_t

ech

niq

ue

Too

l

ocr

ato

oli

ssu

ffic

ien

tly

tru

stw

ort

hy

tech

niq

ue

Too

l

Go

al:

veri

fTo

ol_

tech

niq

ue

Too

l.0.

2_

tech

niq

ue

To

ol

ocr

ato

oli

ssu

ffic

ien

tly

tru

stw

ort

hy

tech

niq

ue

To

ol

Go

al:

veri

fTo

ol_

tech

niq

ue

Too

l.0.

3_t

ech

niq

ue

To

ol

ocr

ato

oli

ssu

ffic

ien

tly

tru

stw

ort

hy

tech

niq

ue

To

ol

Go

al:

form

alM

od

el.

0

ocr

afo

rmal

mo

del

isa

corr

ect

rep

rese

nta

tio

no

fth

eM

ILS-

AA

DL

mo

de

l

Go

al;f

orm

alM

od

el.0

ocr

afo

rmal

mo

de

lis

aco

rre

ctre

pre

sen

tati

on

of

the

MIL

S-A

AD

Lm

od

el

Go

al:

form

alM

od

el.

0

ocr

afo

rmal

mo

de

lis

aco

rre

ctre

pre

sen

tati

on

of

the

MIL

S-A

AD

Lm

od

el

Stra

t:fo

rmal

Mo

del

Arg

um

ent

ove

rth

etr

ansl

atio

nfr

om

MIL

S-A

AD

Lto

the

form

alre

pre

sen

tati

on

Stra

t:fo

rmal

Mo

de

l

Arg

um

en

to

ver

the

tran

slat

ion

fro

mM

ILS-

AA

DL

toth

efo

rmal

rep

rese

nta

tio

n

Stra

t;fo

rma

lMo

del

Arg

um

ent

ove

rth

etr

ansl

atio

nfr

om

MIL

S-A

AD

Lto

the

form

alre

pre

sen

tati

on

Go

al:

valid

ate

.0

ocr

afo

rmal

mo

de

lval

idat

ion

de

mo

nst

rate

sit

isco

rrec

tw

.r.t

.th

eM

ILS-

AA

DL

mo

de

l

Go

al:

valid

ate

.0

ocr

afo

rmal

mo

del

valid

atio

nd

emo

nst

rate

sit

isco

rre

ctw

.r.t

.th

eM

ILS-

AA

DL

mo

del

Go

al;

valid

ate

.0

ocr

afo

rmal

mo

del

valid

atio

nd

emo

nst

rate

sit

isco

rre

ctw

.r.t

.th

eM

ILS-

AA

DL

mo

del

Go

al:t

ran

sTo

ol_

tech

niq

ue

Too

l.0

_te

chn

iqu

eT

oo

l

ocr

atr

ansl

atio

nto

oli

ssu

ffic

ien

tly

tru

stw

ort

hy te

chn

iqu

eT

oo

l

Go

al:t

ran

sTo

ol_

tech

niq

ue

Too

l.0

_te

chn

iqu

eT

oo

l

ocr

atr

ansl

atio

nto

oli

ssu

ffic

ien

tly

tru

stw

ort

hy te

chn

iqu

eTo

ol

Go

al:t

ran

sTo

ol_

tech

niq

ue

Too

l.0

_te

chn

iqu

eT

oo

l

ocr

atr

ansl

atio

nto

oli

ssu

ffic

ien

tly

tru

stw

ort

hy te

chn

iqu

eTo

ol

Figure 22: Starlight composition module GSN structure

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 71

Page 78: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

AcronymsMCNF MILS configuration-normal-form 19

MNS MILS Network Subsystem 22

Page 72 Version 1.3Confidentiality: Public Distribution

1 October 2015

Page 79: D4.3 Integration of formal evidence and expression in MILS ... · D4.3 Integration of formal evidence and expression in MILS assurance case Document Control Version Status Date 0.1

D4.3 Integration of formal evidence and expression in MILS assurance case

References

[1] GSN community standard. Technical report, Origin Consulting (York) Limited, 2011.

[2] Translation of MILS-AADL into Formal Architectural Modeling Framework. Technical ReportD2.2, Version 1.2, D-MILS Project, February 2014. http://www.d-mils.org/page/results.

[3] Compositional assurance cases and arguments for distributed MILS. Technical Report D4.2,Version 1.0, D-MILS Project, April 2014. http://www.d-mils.org/page/results.

[4] Security and distributed MILS TTEthernet. Technical Report D6.5, Version 1, D-MILS Project,2015. http://www.d-mils.org/page/results.

1 October 2015 Version 1.3Confidentiality: Public Distribution

Page 73