A Framework for Automatic Verifying Privacy Properties of Security Protocols

نویسندگان

  • Luu Anh Tuan
  • Yang Liu
  • Jin Song Dong
  • Jun Sun
چکیده

Security protocols play more and more important role with widely use in many applications nowadays. They are designed to provide security properties for users who wish to exchange messages over unsecured medium. There are many tools were designed to specify and verify security protocols such as Casper/FDR, ProVerif or AVISPA. While most of the existing tools focus on secrecy and authentication properties. few supports properties like anonymity and privacy, which are crucial in many protocols such as in electronic voting systems or anonymous online transactions. Moreover, to the best of our knowledge, there is still not have a fully automatic tool using formal methods to verify these two properties. In this paper, we introduce a framework for specifying security protocols in the Labeled Transition System (LTS) semantics model and give the formal definition for three existing types of anonymity and privacy properties using this model. We also come up with the verification algorithms for verification and implement all the ideas in a module SeVe inside PAT model checker.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Automated Verifying Anonymity and Privacy Properties of Security Protocols

Security protocols play more and more important role with widely use in many applications nowadays. They are designed to provide security properties for users who wish to exchange messages over unsecured medium. There are many tools were designed to specify and verify security protocols such as Casper/FDR, ProVerif or AVISPA. While most of the existing tools focus on secrecy and authentication ...

متن کامل

Automated Verification of Exam , Cash , Reputation , and Routing Protocols

Security is a crucial requirement in the applications based on information and communication technology, especially when an open network such as the Internet is used. To ensure security in such applications several security protocols have been developed. However, the design of complex security protocols is notoriously difficult and error-prone. Several flaws have been found on protocols that ar...

متن کامل

Verifying privacy-type properties of electronic voting protocols

Electronic voting promises the possibility of a convenient, efficient and secure facility for recording and tallying votes in an election. Recently highlighted inadequacies of implemented systems have demonstrated the importance of formally verifying the underlying voting protocols. We study three privacy-type properties of electronic voting protocols: in increasing order of strength, they are ...

متن کامل

A Program Logic for Verifying Secure Routing Protocols

The Internet, as it stands today, is highly vulnerable to attacks. However, little has been done to understand and verify the formal security guarantees of proposed secure inter-domain routing protocols, such as Secure BGP (S-BGP). In this paper, we develop a sound program logic for SANDLog—a declarative specification language for secure routing protocols—for verifying properties of these proto...

متن کامل

Enhancing privacy of recent authentication schemes for low-cost RFID systems

Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011