New abstractions in applied pi-calculus and automated verification of protected executions

نویسندگان

  • Shiwei Xu
  • Sergiu Bursuc
  • Julian P. Murphy
چکیده

Protocols for the protected execution of programs,like those based on a hardware root of trust, will become offundamental importance for computer security. In parallel tosuch protocols, there is therefore a need to develop models andtools that allow formal specification and automated verificationof the desired security properties. Still, current protocols lackrealistic models and automated proofs of security. This is due toseveral challenges that we address in this paper.We consider the classical setting of applied pi-calculus andProVerif, that we enrich with several generic models that allowverification of protocols designed for a given computing platform.Our contributions include models for specifying platform statesand for dynamically loading and executing protected programs.We also propose a new method to make ProVerif terminate ona challenging search space the one obtained by allowing anunbounded number of extensions and resets for the platformconfiguration registers of the TPM.We illustrate our methods with the case study of a protocolfor a dynamic root of trust (based on a TPM), which includesdynamic loading, measurement and protected execution of pro-grams. We prove automatically with ProVerif that code integrityand secrecy of sealed data hold for the considered protocol.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design and formal verification of DZMBE+

In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...

متن کامل

Automatic Verification of Security Properties in Remote Internet Voting Protocol with Applied Pi Calculus

Soundness and coercion resistance are the important and intricate security requirements for remote voting protocols. Several formal models of soundness and coercion-resistance have been proposed in the literatures, but these formal models are not supported by automatic tools. Recently Backes et al. propose a new formal automated model of security properties including soundness and coercionresis...

متن کامل

Automatic Verification of Privacy Properties in the Applied pi Calculus

We develop a formal method verification technique for cryptographic protocols. We focus on proving observational equivalences of the kind P ∼ Q, where the processes P and Q have the same structure and differ only in the choice of terms. The calculus of ProVerif, a variant of the applied pi calculus, makes some progress in this direction. We expand the scope of ProVerif, to provide reasoning abo...

متن کامل

Verifying Properties of Electronic Voting Protocols

In this paper we report on some recent work to formally specify and verify electronic voting protocols. In particular, we use the formalism of the applied pi calculus: the applied pi calculus is a formal language similar to the pi calculus but with useful extensions for modelling cryptographic protocols. We model several important properties, namely fairness, eligibility, privacy, receipt-freen...

متن کامل

Using Theorem Proving with Algorithmic Techniques for Large-Scale System Verification∗

We propose to write a thesis on using theorem proving with algorithmic techniques for verification of large scale computer systems. Large-scale computer systems tend to have a non-terminating computation, and reasoning about such systems involves exhibiting some temporal property of the system. For large system models, automatic verification of non-trivial temporal properties is often infeasibl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2013  شماره 

صفحات  -

تاریخ انتشار 2013