A method for unbounded verification of privacy-type properties

نویسندگان

  • Lucca Hirschi
  • David Baelde
  • Stéphanie Delaune
چکیده

In this paper, we consider the problem of verifying anonymity and unlinkability in the symbolic model,where protocols are represented as processes in a variant of the applied pi calculus, notably used in the ProVeriftool. Existing tools and techniques do not allow to verify directly these properties, expressed as behavioral equiv-alences. We propose a di erent approach: we design two conditions on protocols which are su cient to ensureanonymity and unlinkability, and which can then be e ectively checked automatically using ProVerif. Our twoconditions correspond to two broad classes of attacks on unlinkability, i.e. data and controlow leaks. This the-oretical result is general enough that it applies to a wide class of protocols based on a variety of cryptographicprimitives. In particular, using our tool, UKano, we provide the rst formal security proofs of protocols such asBAC and PACE (e-passport), Hash-Lock (RFID authentication), etc. Our work has also lead to the discoveryof new attacks, including one on the LAK protocol (RFID authentication) which was previously claimed to beunlinkable (in a weak sense).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Some results about unbounded convergences in Banach lattices

Suppose E is a Banach lattice. A net  in E is said to be unbounded absolute weak convergent ( uaw-convergent, for short) to  provided that the net  convergences to zero, weakly.  In this note, we further investigate unbounded absolute weak convergence in E. We show that this convergence is stable under passing to and   from ideals and sublattices. Compatible with un-convergenc, we show that ...

متن کامل

Privacy Requirements: Present & Future

Software systems are increasingly open, handle large amounts of personal or other sensitive data and are intricately linked with the daily lives of individuals and communities. This poses a range of privacy requirements. Such privacy requirements are typically treated as instances of requirements pertaining to compliance, traceability, access control, verification or usability. Though important...

متن کامل

Statistical Verification of Probabilistic Properties with Unbounded Until

We consider statistical (sampling-based) solution methods for verifying probabilistic properties with unbounded until. Statistical solution methods for probabilistic verification use sample execution trajectories for a system to verify properties with some level of confidence. The main challenge with properties that are expressed using unbounded until is to ensure termination in the face of pot...

متن کامل

Model-Checking Systems with Unbounded Variables without Abstraction

The problem addressed in this paper is the formal verification of temporal properties in the presence of unbounded data types. In that framework, state of the art model-checkers use reduction techniques, e.g. abstraction, to compute finite counterparts of the systems under consideration. The method we present integrates a model-checker for the modal ν-calculus with a theorem prover, it processe...

متن کامل

Verification of Infinite State Systems by Compositional Model Checking

A method of compositional verification is presented that uses the combination of temporal case splitting and data type reductions to reduce types of infinite or unbounded range to small finite types, and arrays of infinite or unbounded size to small fixed-size arrays. This supports the verification by model checking of systems with unbounded resources and uninterpreted functions. The method is ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1710.02049  شماره 

صفحات  -

تاریخ انتشار 2017