Validating Security Protocols under the General Attacker

作者: Wihem Arsac , Giampaolo Bella , Xavier Chantry , Luca Compagna

DOI: 10.1007/978-3-642-03459-6_3

关键词:

摘要: Security protocols have been analysed using a variety of tools and focusing on properties. Most findings assume the ever so popular Dolev-Yao threat model. A more recent model called Rational Attacker [1] sees each protocol participant decide whether or not to conform upon their own cost/benefit analysis. Each neither colludes nor shares knowledge with anyone, feature that rules out applicability existing equivalence results in Aiming at mechanical validation, we abstract away actual analysis obtain General model, which principal blindly act as attacker. The security under brings forward yet insights: retaliation attacks anticipation are our main findings, while tool support can scale up new negligible price. The general for based set-rewriting was adopted AVISPA [2] is leveraged express Attacker. state-of-the-art checker SATMC [3] then used automatically validate threats, be found.

参考文章(29)
Martí;n Abadi, Phillip Rogaway, Reconciling Two Views of Cryptography ifip international conference on theoretical computer science. pp. 3- 22 ,(2000) , 10.1007/3-540-44929-9_1
Giampaolo Bella, What is Correctness of Security Protocols Journal of Universal Computer Science. ,vol. 14, pp. 2083- 2106 ,(2008) , 10.3217/JUCS-014-12-2083
Dieter Gollmann, On the Verification of Cryptographic Protocols: A Tale of Two Committees Electronic Notes in Theoretical Computer Science. ,vol. 32, pp. 42- 58 ,(2000) , 10.1016/S1571-0661(04)00094-5
Phillip Rogaway, Martín Abadi, Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption) Lecture Notes in Computer Science. pp. 3- 22 ,(2000)
Will Marrero, Edmund Clarke, Somesh Jha, Model Checking for Security Protocols Defense Technical Information Center. ,(1997) , 10.21236/ADA327281
Rajeev Alur, Kousha Etessami, P. Madhusudan, A Temporal Logic of Nested Calls and Returns tools and algorithms for construction and analysis of systems. ,vol. 2988, pp. 467- 481 ,(2004) , 10.1007/978-3-540-24730-2_35
Martı́n Abadi, Andrew D. Gordon, A calculus for cryptographic protocols Information & Computation. ,vol. 148, pp. 1- 70 ,(1999) , 10.1006/INCO.1998.2740
G Lowe, B Roscoe, M Goldsmith, S Schneider, P Ryan, Modelling and analysis of security protocols Addison-Wesley. ,(2001)