Model Checking Electronic Commerce Protocols
نویسندگان
چکیده
The paper develops model checking techniques to ex amine NetBill and Digicash We show how model checking can verify atomicity properties by analyzing simpli ed versions of these protocols that retain cru cial security constraints For our analysis we used the FDR model checker Atomicity Properties Correctness is a prime concern for electronic com merce protocols How can we show that a given pro tocol is safe for use Here we show how to use model checking to test whether electronic commerce proto cols satisfy some given atomicity properties For verifying properties of protocols model check ing is a dramatic improvement over doing hand proofs because it is mechanizable it is a dra matic improvement over using state of the art theo rem provers because it is automatic fast and requires no human interaction Moreover we found a number of problems in proposed electronic commerce proto cols using model checking Model checking allows us to focus on just those aspects of the protocol neces sary to guarantee desired properties In doing so we can gain a better understanding of why the protocol works and often can identify places of optimizing it For this paper we have chosen to check atomicity properties argue that these properties are central to electronic commerce protocols In an atomic protocol an electronic purchase either aborts with no transfer of money and goods or This work was supported in part by Defense Advanced Re searchProject Agency ARPA contract F the National Science Foundation NSF cooperative agreement IR and by the US Postal Service This work is the opin ion of the authors and does not necessarily represent the view of their employers funding sponsors or the US Government fully completes with money and goods ex changed Moreover these atomic properties are preserved even if communications fail between some of the parties because of failure of either a communications link or a node including the parties participating in the pro tocol Tygar gave informal descriptions of three pro tocol properties that appear to be related to atomic ity money atomicity Money should neither be created nor destroyed by electronic commerce protocols For example this protocol is not money atomic Consumer sends message to consumer s bank transfer value to merchant Consumer s bank decrements consumer s balance by value Consumer s bank sends message to mer chant s bank increase merchant s bank bal
منابع مشابه
Model Checking Electronic Commerce
The paper develops model checking techniques to examine NetBill and Digicash. We show how model checking can nd atomicity problems by analyzing simpliied versions of these protocols that retain crucial security problems. For our analysis we used the FDR model checker 13]. Note to reviewers: This is an extended abstract only. We anticipate that some of the work described in Section 5 will be com...
متن کاملA Machine Checkable Logic of Knowledge for Specifying Security Properties of Electronic Commerce Protocols
A number of researchers have proposed various tools for checking security protocols. Most of these tools work by comparing the set of possible traces (as expressed by some model of computation) to the set of correct traces (often expressed as a set of relationships between events in a trace). In this paper we propose a new logic of knowledge in which one can express relationships between events...
متن کاملModel Checking Electronic Commerce Protocols Extended Abstract
The paper develops model checking techniques to examine NetBill and Digicash. We show how model checking can nd atomicity problems by analyzing simpli ed versions of these protocols that retain crucial security problems. For our analysis we used the FDR model checker [13]. Note to reviewers: This is an extended abstract only. We anticipate that some of the work described in Section 5 will be co...
متن کاملFailure Analysis of an E-Commerce Protocol Using Model Checking
The rapid growth of electronic commerce (e-commerce) has necessitated the development of e-commerce protocols. These protocols ensure the confidentiality and integrity of information exchanged. In addition, researchers have identified other desirable properties, such as, money atomicity, goods atomicity and validated receipt, that must be satisfied by e-commerce protocols. This paper shows how ...
متن کاملSecurity Modelling for Electronic Commerce: The Common Electronic Purse Specifications
Designing security-critical systems correctly is very difficult. We present work on software engineering of security critical systems, supported by the CASE tool AUTOFOCUS. Security critical systems are specified with extended structure diagrams, message sequence charts for the protocols and statecharts for the attacker, translated into an AUTOFOCUS system model and examined for security weakne...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1996