New abstractions in applied pi-calculus and automated verification of protected executions
نویسندگان
چکیده
Protocols for the protected execution of programs,like those based on a hardware root of trust, will become offundamental importance for computer security. In parallel tosuch protocols, there is therefore a need to develop models andtools that allow formal specification and automated verificationof the desired security properties. Still, current protocols lackrealistic models and automated proofs of security. This is due toseveral challenges that we address in this paper.We consider the classical setting of applied pi-calculus andProVerif, that we enrich with several generic models that allowverification of protocols designed for a given computing platform.Our contributions include models for specifying platform statesand for dynamically loading and executing protected programs.We also propose a new method to make ProVerif terminate ona challenging search space the one obtained by allowing anunbounded number of extensions and resets for the platformconfiguration registers of the TPM.We illustrate our methods with the case study of a protocolfor a dynamic root of trust (based on a TPM), which includesdynamic loading, measurement and protected execution of pro-grams. We prove automatically with ProVerif that code integrityand secrecy of sealed data hold for the considered protocol.
منابع مشابه
Design and formal verification of DZMBE+
In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...
متن کاملAutomatic Verification of Security Properties in Remote Internet Voting Protocol with Applied Pi Calculus
Soundness and coercion resistance are the important and intricate security requirements for remote voting protocols. Several formal models of soundness and coercion-resistance have been proposed in the literatures, but these formal models are not supported by automatic tools. Recently Backes et al. propose a new formal automated model of security properties including soundness and coercionresis...
متن کاملAutomatic Verification of Privacy Properties in the Applied pi Calculus
We develop a formal method verification technique for cryptographic protocols. We focus on proving observational equivalences of the kind P ∼ Q, where the processes P and Q have the same structure and differ only in the choice of terms. The calculus of ProVerif, a variant of the applied pi calculus, makes some progress in this direction. We expand the scope of ProVerif, to provide reasoning abo...
متن کاملVerifying Properties of Electronic Voting Protocols
In this paper we report on some recent work to formally specify and verify electronic voting protocols. In particular, we use the formalism of the applied pi calculus: the applied pi calculus is a formal language similar to the pi calculus but with useful extensions for modelling cryptographic protocols. We model several important properties, namely fairness, eligibility, privacy, receipt-freen...
متن کاملUsing Theorem Proving with Algorithmic Techniques for Large-Scale System Verification∗
We propose to write a thesis on using theorem proving with algorithmic techniques for verification of large scale computer systems. Large-scale computer systems tend to have a non-terminating computation, and reasoning about such systems involves exhibiting some temporal property of the system. For large system models, automatic verification of non-trivial temporal properties is often infeasibl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2013 شماره
صفحات -
تاریخ انتشار 2013