On-the-fly Model Checking of Security Protocols

نویسنده

  • Guoqiang Li
چکیده

Due to extreme importance of security protocols in the modern world, to ensure security protocols to be more reliable, and to speed up the development of new protocols, it is important to have tools that support the activity of finding flaws in protocols, or guaranteeing correctness of protocols. Various formalisms for the specification of security protocols have been proposed based on, e.g. process calculi, belief logic, higher-order logic, first-order logic, linear logic, equational logic, hidden algebra, and tree automata. They adopted different full-automatic or semi-automatic techniques, such as model checking based on finite models, resolution, and higher-order theorem proving. However, security protocol analysis proves to be a rather difficult task. Due to the complication of the network, models for security protocol analysis should be carefully designed to depict each infinity factor one assumed. A dilemma has occurred when one tries to propose a methodology for security protocol analysis, dealing with the infinity factors above. On the one hand, a model for security protocols should be strong enough in expressiveness to describe any possible situation that a running protocol may reach, or it may fail in detecting subtle attacks of a security protocol. On the other hand, analyzing a property on a model strong in expressiveness may be undecidable. Thus automatic techniques may not terminate when detecting flaws. Our aim is to propose a flexible and expressive model to represent behaviors of security protocols. Deductive systems can be inserted freely to integrate the model, to represent infinitely many messages intruders or dishonest principals generate, due to different security assumptions. Driven by different security requirements, various security properties can be analyzed in the model. The analysis method is sound and complete with respect to the analyzed property, under the assumption provided by the model. The objectives are listed as follows,

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

On-the-fly Model Checking of Security Protocols and Its Implementation by Maude

Trace analysis for a security protocol represents every possible run as a trace and analyzes whether any insecure run is reachable. The number of traces will be infinite due to (1) infinitely many sessions of a protocol, (2) infinitely many principals in the network, and (3) infinitely many messages that intruders can generate. This paper presents an on-the-fly model checking method by restrict...

متن کامل

An On-the-Fly Model-Checker for Security Protocol Analysis

We introduce the on-the-fly model-checker OFMC, a tool that combines two methods for analyzing security protocols. The first is the use of lazy data-types as a simple way of building an efficient on-the-fly model checker for protocols with infinite state spaces. The second is the integration of symbolic techniques for modeling a DolevYao intruder, whose actions are generated in a demand-driven ...

متن کامل

Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol

Authentication and secrecy have been widely investigated in security protocols. They are closely related to each other and variants of definitions have been proposed, which focus on the concepts of corresponding assertion and key distribution. This paper proposes an onthe-fly model checking method based on the pushdown system to verify the authentication of recursive protocols with an unbounded...

متن کامل

On-the-Fly Model Checking of Fair Non-repudiation Protocols

A fair non-repudiation protocol should guarantee, (1) when a sender sends a message to a receiver, neither the sender nor the receiver can deny having participated in this communication; (2) no principals can obtain evidence while the other principals cannot do so. This paper extends the model in our previous work [12], and gives a sound and complete on-the-fly model checking method for fair no...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008