AN INDUSTRIAL AND ACADEMIC JOINT EXPERIMENT ON AUTOMATED VERIFICATION OF A SECURITY PROTOCOL

作者: OLIVIER HEEN , THOMAS GENET , STEPHANE GELLER , NICOLAS PRIGENT

DOI: 10.1142/9789812833266_0004

关键词:

摘要: This paper relates the collaboration between industrial and academic teams for design verification of a security protocol. The protocol is about trust establishment in large communities devices where infrastructure components are not always reachable. covers writing formal specifications up to their verification, using both manual automated methods embedded AVISPA [1] SPAN [7] tools. At each stage, use visualization animation facilities key mutual understanding working teams. As result, we obtain much more confidence final We also demonstrate usefulness some countermeasures.

参考文章(11)
Bruno Crispo, Bogdan C. Popescu, Andrew S. Tanenbaum, Symmetric Key Authentication Services Revisited australasian conference on information security and privacy. ,vol. 3108, pp. 248- 261 ,(2004) , 10.1007/978-3-540-27800-9_22
Olivier Heen, Jean-Pierre Andreaux, Nicolas Prigent, Improving Secure Device Insertion in Home Ad Hoc Networks information security conference. pp. 381- 394 ,(2004) , 10.1007/1-4020-8143-X_25
Michael Burrows, Martin Abadi, Roger Needham, A logic of authentication ACM Transactions on Computer Systems. ,vol. 8, pp. 18- 36 ,(1990) , 10.1145/77648.77649
D. Dolev, A. Yao, On the security of public key protocols IEEE Transactions on Information Theory. ,vol. 29, pp. 198- 208 ,(1983) , 10.1109/TIT.1983.1056650
Nicolas Prigent, Christophe Bidan, Jean-Pierre Andreaux, Olivier Heen, Secure long term communities in ad hoc networks Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks - SASN '03. pp. 115- 124 ,(2003) , 10.1145/986858.986874
Alessandro Armando, David Basin, Yohan Boichut, Yannick Chevalier, Luca Compagna, Jorge Cuéllar, P Hankes Drielsma, Pierre-Cyrille Héam, Olga Kouchnarenko, Jacopo Mantovani, Sebastian Mödersheim, David Von Oheimb, Michaël Rusinowitch, Judson Santiago, Mathieu Turuani, Luca Vigano, Laurent Vigneron, None, The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications Computer Aided Verification. ,vol. 3576, pp. 281- 285 ,(2005) , 10.1007/11513988_27
M. Weiser, The Computer for the 21st Century Scientific American. ,vol. 265, pp. 94- 104 ,(1991) , 10.1038/SCIENTIFICAMERICAN0991-94
Roger M. Needham, Michael D. Schroeder, Using encryption for authentication in large networks of computers Communications of the ACM. ,vol. 21, pp. 993- 999 ,(1978) , 10.1145/359657.359659
Whitfield Diffie, Martin E Hellman, None, New Directions in Cryptography IEEE Transactions on Information Theory. ,vol. 22, pp. 644- 654 ,(1976) , 10.1109/TIT.1976.1055638
Yann Glouche, Yohan Boichut, Thomas Genet, Olivier Heen, Using Animation to Improve Formal Specifications of Security Protocols ,(2007)