Model Checking Electronic Commerce Protocols

نویسندگان

  • Nevin Heintze
  • J. D. Tygar
  • Jeannette Wing
  • H. Chi Wong
چکیده

The paper develops model checking techniques to ex amine NetBill and Digicash We show how model checking can verify atomicity properties by analyzing simpli ed versions of these protocols that retain cru cial security constraints For our analysis we used the FDR model checker Atomicity Properties Correctness is a prime concern for electronic com merce protocols How can we show that a given pro tocol is safe for use Here we show how to use model checking to test whether electronic commerce proto cols satisfy some given atomicity properties For verifying properties of protocols model check ing is a dramatic improvement over doing hand proofs because it is mechanizable it is a dra matic improvement over using state of the art theo rem provers because it is automatic fast and requires no human interaction Moreover we found a number of problems in proposed electronic commerce proto cols using model checking Model checking allows us to focus on just those aspects of the protocol neces sary to guarantee desired properties In doing so we can gain a better understanding of why the protocol works and often can identify places of optimizing it For this paper we have chosen to check atomicity properties argue that these properties are central to electronic commerce protocols In an atomic protocol an electronic purchase either aborts with no transfer of money and goods or This work was supported in part by Defense Advanced Re searchProject Agency ARPA contract F the National Science Foundation NSF cooperative agreement IR and by the US Postal Service This work is the opin ion of the authors and does not necessarily represent the view of their employers funding sponsors or the US Government fully completes with money and goods ex changed Moreover these atomic properties are preserved even if communications fail between some of the parties because of failure of either a communications link or a node including the parties participating in the pro tocol Tygar gave informal descriptions of three pro tocol properties that appear to be related to atomic ity money atomicity Money should neither be created nor destroyed by electronic commerce protocols For example this protocol is not money atomic Consumer sends message to consumer s bank transfer value to merchant Consumer s bank decrements consumer s balance by value Consumer s bank sends message to mer chant s bank increase merchant s bank bal

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Model Checking Electronic Commerce

The paper develops model checking techniques to examine NetBill and Digicash. We show how model checking can nd atomicity problems by analyzing simpliied versions of these protocols that retain crucial security problems. For our analysis we used the FDR model checker 13]. Note to reviewers: This is an extended abstract only. We anticipate that some of the work described in Section 5 will be com...

متن کامل

A Machine Checkable Logic of Knowledge for Specifying Security Properties of Electronic Commerce Protocols

A number of researchers have proposed various tools for checking security protocols. Most of these tools work by comparing the set of possible traces (as expressed by some model of computation) to the set of correct traces (often expressed as a set of relationships between events in a trace). In this paper we propose a new logic of knowledge in which one can express relationships between events...

متن کامل

Model Checking Electronic Commerce Protocols Extended Abstract

The paper develops model checking techniques to examine NetBill and Digicash. We show how model checking can nd atomicity problems by analyzing simpli ed versions of these protocols that retain crucial security problems. For our analysis we used the FDR model checker [13]. Note to reviewers: This is an extended abstract only. We anticipate that some of the work described in Section 5 will be co...

متن کامل

Failure Analysis of an E-Commerce Protocol Using Model Checking

The rapid growth of electronic commerce (e-commerce) has necessitated the development of e-commerce protocols. These protocols ensure the confidentiality and integrity of information exchanged. In addition, researchers have identified other desirable properties, such as, money atomicity, goods atomicity and validated receipt, that must be satisfied by e-commerce protocols. This paper shows how ...

متن کامل

Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications

Designing security-critical systems correctly is very difficult. We present work on software engineering of security critical systems, supported by the CASE tool AUTOFOCUS. Security critical systems are specified with extended structure diagrams, message sequence charts for the protocols and statecharts for the attacker, translated into an AUTOFOCUS system model and examined for security weakne...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996