=Paper=
{{Paper
|id=Vol-241/paper-4
|storemode=property
|title=Modeling Airport Security Regulations in Focal
|pdfUrl=https://ceur-ws.org/Vol-241/paper4.pdf
|volume=Vol-241
|authors=David Delahaye,Jean-Frédéric Étienne,Véronique Viguié Donzeau-Gouge
|dblpUrl=https://dblp.org/rec/conf/caise/DelahayeED06
}}
==Modeling Airport Security Regulations in Focal==
806 Regulations Modelling and their Validation and Verification
Modeling Airport Security Regulations in Focal
David Delahaye, Jean-Frédéric Étienne,
and Véronique Viguié Donzeau-Gouge
CEDRIC/CNAM, Paris, France,
David.Delahaye@cnam.fr, etien_je@auditeur.cnam.fr,
donzeau@cnam.fr
Abstract. We describe the formal models of two standards related to
airport security: one at the international level and the other at the Eu-
ropean level. These models are expressed using the Focal environment,
which is an object-oriented specication and proof system. We show how
Focal is appropriate for building a clean hierarchical specication for our
case study using, in particular, object-oriented features to rene the in-
ternational level into the European level and parameterization to mod-
ularize the development.
1 Introduction
The primary goal of the international standards and recommended practices
regulating airport security is to safeguard civil aviation against acts of unlawful
interference. These normative documents detail the roles and responsibilities of
the various stake-holders and pinpoint a set of security measures (as well as the
ways and means to implement them) that each airport serving civil aviation
has to comply with. In addition, the entire regulatory system is organized in a
hierarchical way, where each level has its own set of regulatory documents that
are drafted and maintained by dierent bodies. All these documents are written
in natural language and due to their voluminous size, it is dicult to manually
assess the consistency of the entire regulatory system. Moreover, informal deni-
tions tend to be inaccurate and may be interpreted in various inconsistent ways
by dierent readers. However, these documents have the merit of being rigorously
structured. Ensuring their consistency and completeness while eliminating any
ambiguity or misunderstanding is a signicant step towards the reinforcement
of airport security.
In this paper, we describe the formal models of the two standards related
to airport security as well as some results obtained from their analysis. The
rst standard is the international standard Annex 17 [4] (to the Doc 7300/8)
produced by the International Civil Aviation Organization (ICAO) and the sec-
ond one is the European Directive Doc 2320 [1], produced by the European
Civil Aviation Conference (ECAC), which is supposed to rene the rst one at
European level. We took as a starting point the preventive security measures
described in Chapter 4 of Annex 17 and focused on security measures 4.1, 4.2,
4.4, 4.5 and 4.7. The formalization was carried out within the framework of the
REMO2V'06 807
EDEMOI1 project [5, 2], which aims to integrate and apply several requirements
engineering and formal methods techniques to analyze regulation standards in
the domain of airport security. The formal models have been designed using the
Focal [6] environment and from their analysis, we have been able:
1. to clarify ambiguities and misunderstandings resulting from the use of in-
formal denitions expressed in natural language;
2. to detect inconsistencies or to provide evidence of their absence;
3. to identify hidden assumptions, which may lead to shortcomings when
additional explanations are required (for example, in airport security pro-
grams).
Another motivation of this work is to validate and assess the design features
as well as the reasoning support mechanism oered by the Focal [6] specication
and proof system. In Focal, it is possible to build applications step by step,
going from abstract specications, called species, to concrete implementations,
called collections. These dierent structures are combined using inheritance and
parameterization, inspired by object-oriented programming; moreover, each of
these structures is equipped with a carrier set, a list of functions, properties and
theorems. In collections, all functions are dened and all properties are proved.
In our case study, we intensively use the features of inheritance and pa-
rameterization. Inheritance allows us to naturally express the renement of the
international level by the European one. Parameterization provides us with a
form of polymorphism so that we can factorize parts of our development and
obtain a very modular specication. Finally, regarding the reasoning support,
the rst-order automated theorem-prover of Focal, called Zenon, bring us an
eective help by automatically discharging most of the proofs required by the
specication.
2 Formalization
2.1 Model domain
The rst step of the modeling process is to identify the subjects necessary for
the formalization of the preventive security measures, together with their respec-
tive properties/attributes and the relationships between them. It is also essential
to determine the hierarchical organization of the identied subjects in order to
eectively factorize functions and properties during the formalization process
(through the use of inheritance and parameterization). This is done by deter-
mining the dependencies between the security measures w.r.t. the denitions
of terms used in the corresponding normative document. For example, let us
consider the following security measure described in Chapter 4 of Annex 17:
1
The EDEMOI project is supported by the French National "Action Concertée Inci-
tative Sécurité Informatique".
808 Regulations Modelling and their Validation and Verification
4.5.1 Each Contracting State shall establish measures to ensure that orig-
inating hold baggage is screened prior to being loaded into an aircraft en-
gaged in commercial air transport operations departing from a security
restricted area.
To be able to formalize this
originatingHoldBaggage
security measure, we have to de-
transferHoldBaggage
ne the subjects originating hold
baggage, aircraft and security re-
cabinBaggage holdBaggage stricted area, together with the re-
lations between them. Moreover,
we need to dene appropriate at-
basicBaggage tributes for the originating hold
Fig. 1. Hierarchy for baggage in Annex 17. baggage subject to characterize the
state of being screened and of being
on board. Finally, to complete the formalization, we have to specify the integrity
constraints induced by the regulation (e.g. weapons carried in hold baggage are
considered to be inaccessible during ight time). The hierarchies of subjects
obtained after analyzing all the preventive security measures of Annex 17 are
represented by a Focal model, where each subject is a species. For instance, the
Focal model for baggage is given in Figure 12 (where nodes are species and ar-
rows inheritance relations s.t. A ← B means species B inherits from A). For
possible extensions during the renement process, the carrier type of the species
is left undened (abstract) and their functions are only declared.
2.2 Annex 17: preventive security measures
An important aspect of regulation modeling is that the formal model needs to
impose a certain structure that will facilitate the traceability and maintainabil-
ity of the normative documents. To achieve this purpose, the model presented
in this section follows the structural decomposition proposed by Chapter 4 of
Annex 17, while taking into account the dependencies between the preventive
security measures. Moreover, it is crucial for the model to make the distinction
between the security measures and the ways and means to implement them.
Most of the security measures are fairly general and correspond to objectives
that each member state has to fulll. As a result, in our model, they are dened
as invariants and each airport security programme must provide procedures that
satisfy these invariants. The consistency and completeness of the regulation are
achieved by establishing that the fundamental security property, dened in para-
graph 4.1 of Annex 17, is satised by all the security measures, while ensuring
their homogeneity. The general structure of the Annex 17 model is represented
in Figure 2.
2
This gure (as well as the others in this paper) was automatically generated using
the inhgraph tool of the Focal environment, which produce, from a Focal specication,
a graph description in the DOT format.
REMO2V'06 809
annex17 The species airsidePer-
sons, ordinaryPassengers,
a17property4_1 specialPassengers and bag-
gage introduce the set do-
a17property4_5
main of the identied sub-
jects as well as their rela-
tional constraints (e.g. two
a17property4_4 a17property4_7 baggage passengers cannot have the
same luggage). The pre-
a17property4_2 ordinaryPassengers specialPassengers ventive security measures
are formalized in species
airsidePersons
a17property4 2, a17prope-
rty4 4, a17property4 5 and
Fig. 2. Structure of Annex 17. a17property4 7, and their
dependencies are dened according to the hierarchical organization of
the subjects they regulate. The fundamental security property is dened
in a17property4 1. It is at this level that the set of on board objects is de-
ned. Finally, the theorems establishing the consistency and completeness of the
regulation are dened in the species annex17. The following is an example of
such theorems:
theorem consistency : !property 4 2 −> !property 4 4 −>
!property4 5 −> !property 4 7 −> !property 4 1
proof : by do set!union1, wp set!union1 def !onboardDangerousObjects,
!property 4 1, !property 4 2, !property 4 4, !property 4 5,
!property 4 7;
where property 4 2, property 4 4, property 4 5 and property 4 7 corre-
spond to the intermediate lemmas dened for each category of preventive security
measures (for example, see Section 2.4). Property property 4 1 corresponds to
the fundamental security property dened in Paragraph 4.1 of Annex 17.
2.3 Doc 2320: some renements
The document structure of Doc 2320 follows the decomposition presented in
Chapter 4 of Annex 17. Renement in Doc 2320 appears at two levels. At the
subject level, the renement consists in enriching the characteristics of the ex-
isting subjects or in adding new subjects. At the security property level, the
security measures become more precise and sometimes more restrictive. The
verication of the consistency and completeness of Doc 2320 is performed in the
same way as in Section 2.2. However, since Doc 2320 renes Annex 17, an addi-
tional verication is required to show that the security measures that it describes
do not invalidate (or are not less restrictive than) the ones dened in Annex 17.
Thus, in addition to consistency proofs, another kind of proofs appears, that are
renement proofs. The model structure obtained for Doc 2320 is described in
Figure 3 (where the existing species coming from Annex 17 are distinguished
with dashed nodes).
810 Regulations Modelling and their Validation and Verification
doc2320
As can be seen, the re-
nement is performed in
such a way as to pre-
d2320property4_1 annex17
d2320property4 d2320property5
serve the dependencies be-
a17property4_1
tween the security mea-
d2320property2 a17property4_4
sures. Moreover, it can
a17property4_5 a17property4_7
be observed that species
a17property4_2
a17property4 7 does not
baggage
have a Doc 2320 counter-
ordinaryPassengerspart. This is because, in
specialPassengers
Doc 2320, no mention to
airsidePersons special categories of pas-
Fig. 3. Structure of Doc 2320. sengers is made. We as-
sume that in this case, the
international standard still prevails. Species d2320property4 1 only extends the
scope of property 4.1 to deal with newly identied subjects.
2.4 Certication: proving with Zenon
Basically, there are two ways of providing proofs to Zenon: the rst one is to give
all the properties and denitions necessary for Zenon to build a proof automat-
ically; the second one is considered when Zenon needs some assistance (in the
form of some reasoning steps or auxiliary lemmas) or when the user wants to
present his/her proof in a more readable form (for this purpose, a proof language
inspired by [3] is available).
As we are concerned with regulation modeling, the formal models produced
are fairly abstract and have hardly any computational content. Consequently,
most of the proof obligations could be derived by simple logical deductions from
the formalized security properties. Therefore, knowing only the provided prop-
erties and denitions, Zenon managed to discharge them automatically. To give
an insight of the complexity of such proof, let us consider the one derived for
Property property 4 5 used in Theorem consistency (see Section 2.2):
theorem property4 5 : all s in self, all a in ac,
ac set!member (a, !departureAircraft (s)) −> all o in do,
do set!member (o, !dangerousObjectsInHold (a, s)) −> do!is authorized (o)
proof : by . . ., !property 4 5 1, ol!invariant screened, t!invariant screened,
!property 4 5 4, !inv secureTfLuggage def !dangerousObjectsInHold
where s is a particular instance of the regulation dedicated to hold baggage,
a an aircraft, and o a dangerous object. With this theorem, we show that the
prescribed security measures related to hold baggage (e.g. Paragraph 4.5.1 in
Section 2.1) are sucient to guarantee that hold baggage (whether originating
or transfer) loaded into an aircraft do not contain any unauthorized dangerous
objects. Here, we only provide the main properties and denitions necessary to
understand the proof construction process. Moreover, to simplify the presenta-
tion, we slightly modify the specication to only consider dangerous objects in
REMO2V'06 811
general and ignore the special treatment required for weapons. To be able to vi-
sualize the automatically derived proof, we need to describe how the concerned
security measures were formalized in species a17property4 5 (see Figure 2). The
following concerns Paragraph 4.5.1 (see Section 2.1):
property property 4 5 1 : all s in self, all l in ol,
ol set!member (l, !originatingHoldLuggage (s)) −>
ol!loaded (l) −> ol!screened (l);
where s represents a particular instance of the regulation and l an originating
hold baggage. This property states that if originating hold baggage are loaded
into an aircraft then they have been subjected to appropriate screening. The
security property 4.5.4 regulating transfer hold baggage is formalized in a similar
way, except that transfer hold baggage coming from secure destinations may not
be subjected to screening. Finally, the fact of being a screened hold baggage is
specied in species holdBaggage (see Figure 1) as follows:
property invariant screened : all s in self, !screened (s) −> all o in do,
do set!member (o, !get dangerousObjects (s)) −> do!is authorized (o);
where s represents a hold baggage. This property states that screened hold
baggage are considered to only contain dangerous objects that have been autho-
rized. In species a17property 4 5, a similar property (inv secureTfLuggage) is
dened for transfer hold baggage coming from secure destinations.
2.5 Analyses and results
Ambiguity During the formalization process, various ambiguities could be clar-
ied. For example, let us consider the following property:
4.1 Each Contracting State shall establish measures to prevent weapons,
explosives or any other dangerous devices, articles or substances, which
may be used to commit an act of unlawful interference, the carriage or
bearing of which is not authorized, from being introduced, by any means
whatsoever, on board an aircraft engaged in international civil aviation.
This statement can be interpreted in two dierent ways: either dangerous
objects are never authorized on board, or are admitted on board only if they
are authorized. According to the ICAO, the second interpretation is the correct
one, since Paragraph 4.1 cannot be interpreted without considering the general
context of the regulation.
Consistency and completeness The purpose of Theorem consistency (see
Section 2.2) is to verify whether the fundamental security property can be derived
from the set of preventive security measures. However, this theorem does not
guarantee the absence of contradictions in the regulation. A way to tackle this
problem is to try to derive False from the set of security properties and to let
Zenon work on it for a while (.e.g. one day or much more with a better knowledge
of the strategies used by Zenon and with appropriate proling methods). If the
proof succeeds then we have a contradiction, otherwise we can only have a certain
level of condence.
812 Regulations Modelling and their Validation and Verification
Hidden assumptions The consistency theorems also allowed us to identify
some hidden assumptions done during the drafting process, for instance:
1. since disruptive passengers who are obliged to travel are generally escorted
by law enforcement ocers, they are considered not to have any dangerous
objects;
2. unlike other passengers, transit passengers are not subjected to any specic
security control but should be protected from unauthorized interference at
transit spots. This implies that they are considered to be secure and conse-
quently do not carry any unauthorized dangerous objects.
Development The entire formalization takes about 10000 lines of Focal code,
with in particular, 150 species and 200 proofs. It took about 2 years to be com-
pleted. The development is freely available and can be compiled with the latest
version of Focal (0.3.1): http://cedric.cnam.fr/delahaye/edemoi.tar.gz.
3 Conclusion
A way to improve security is to produce high quality standards. The formal mod-
els of Annex 17 and Doc 2320 regulations, partially described in this paper, tend
to bring an eective solution in the specic framework of airport security. From
these formalizations, some properties could be analyzed and in particular, the
notions of consistency and completeness. This paper also aims to emphasize the
use of the Focal language, which provides a strongly typed and object-oriented
formal development environment. The notions of inheritance and parameteriza-
tion allowed us to build the specications in an incremental and modular way.
Moreover, the Zenon automated theorem prover (provided with Focal) discharged
most of the proof obligations automatically and appeared to be very appropriate
when dealing with abstract specications (i.e. with no concrete representation).
References
1. The European Civil Aviation Conference. Regulation (EC) N◦ 2320/2002 of the
European Parliament and of the Council of 16 December 2002 establishing Common
Rules in the Field of Civil Aviation Security, December 2002.
2. R. Laleau, S. Vignes, Y. Ledru, M. Lemoine, D. Bert, V. Donzeau-Gouge, and
F. Peureux. Application of Requirements Engineering Techniques to the Analysis
of Civil Aviation Security Standards. In International Workshop on Situational
Requirements Engineering Processes (SREP), Paris (France), August 2005.
3. L. Lamport. How to Write a Proof. American Mathematical Monthly, 102(7):600
608, August 1995.
4. The International Civil Aviation Organization. Annex 17 to the Convention on
International Civil Aviation, Security - Safeguarding International Civil Aviation
against Acts of Unlawful Interference, Amendement 11, November 2005.
5. The EDEMOI project, 2003. http://www-lsr.imag.fr/EDEMOI/.
6. The Focal Development Team. Focal, version 0.3.1. CNAM/INRIA/LIP6, May 2005.
Available at: http://focal.inria.fr/.