Stateful Protocol Composition in Isabelle/HOL

被引:2
作者
Hess, Andreas V. [1 ]
Modersheim, Sebastian A. [1 ]
Brucker, Achim D. [2 ]
机构
[1] Tech Univ Denmark, DTU Compute, Richard Petersens Plads,Bldg 324, DK-2800 Lyngby, Denmark
[2] Univ Exeter, Innovat Ctr, Streatham Campus,Rennes Dr, Exeter EX4 4RN, Devon, England
基金
欧盟地平线“2020”;
关键词
Protocol composition; stateful security protocol; Isabelle/HOL; FRAMEWORK;
D O I
10.1145/3577020
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Communication networks like the Internet form a large distributed system where a huge number of components run in parallel, such as security protocols and distributed web applications. For what concerns security, it is obviously infeasible to verify them all at once as one monolithic entity; rather, one has to verify individual components in isolation. While many typical components like TLS have been studied intensively, there exists much less research on analyzing and ensuring the security of the composition of security protocols. This is a problem since the composition of systems that are secure in isolation can easily be insecure. The main goal of compositionality is thus a theorem of the form: given a set of components that are already proved secure in isolation and that satisfy a number of easy-to-check conditions, then also their parallel composition is secure. Said conditions should of course also be realistic in practice, or better yet, already be satisfied for many existing components. Another benefit of compositionality is that when one would like to exchange a component with another one, all that is needed is the proof that the new component is secure in isolation and satisfies the composition conditions-without having to re-prove anything about the other components. This article has three contributions over previous work in parallel compositionality. First, we extend the compositionality paradigm to stateful systems: while previous approaches work only for simple protocols that only have a local session state, our result supports participants who maintain long-term databases that can be shared among several protocols. This includes a paradigm for declassification of shared secrets. This result is in fact so general that it also covers many forms of sequential composition as a special case of stateful parallel composition. Second, our compositionality result is formalized and proved in Isabelle/HOL, providing a strong correctness guarantee of our proofs. This also means that one can prove, without gaps, the security of an entire system in Isabelle/HOL, namely the security of components in isolation and the composition conditions, and thus derive the security of the entire system as an Isabelle theorem. For the components one can also make use of our tool PSPSP that can perform automatic proofs for many stateful protocols. Third, for the compositionality conditions we have also implemented an automated check procedure in Isabelle.
引用
收藏
页数:36
相关论文
共 50 条
[21]   Reasoning about semantic web in Isabelle/HOL [J].
Tang, Y ;
Sun, J ;
Dong, JS ;
Mahony, B .
11TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2004, :46-53
[22]   Hoare logic for Java']Java in Isabelle/HOL [J].
von Oheimb, D .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2001, 13 (13) :1173-1213
[23]   Proving Divide and Conquer Complexities in Isabelle/HOL [J].
Eberl, Manuel .
JOURNAL OF AUTOMATED REASONING, 2017, 58 (04) :483-508
[24]   A Formal Semantics of the Core DOM in Isabelle/HOL [J].
Brucker, Achim D. ;
Herzberg, Michael .
COMPANION PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE 2018 (WWW 2018), 2018, :741-749
[25]   Towards Evolutionary Theorem Proving for Isabelle/HOL [J].
Nagashima, Yutaka .
PROCEEDINGS OF THE 2019 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE COMPANION (GECCCO'19 COMPANION), 2019, :419-420
[26]   On embedding a hardware description language in Isabelle/HOL [J].
Wilayat Khan ;
David Sanan ;
Zhe Hou ;
Liu Yang .
Design Automation for Embedded Systems, 2019, 23 :123-151
[27]   Formalizing Pick's Theorem in Isabelle/HOL [J].
Binder, Sage ;
Kosaian, Katherine .
INTELLIGENT COMPUTER MATHEMATICS, CICM 2024, 2024, 14690 :109-126
[28]   Generalizing a Mathematical Analysis Library in Isabelle/HOL [J].
Aransay, Jesus ;
Divason, Jose .
NASA FORMAL METHODS (NFM 2015), 2015, 9058 :415-421
[29]   Operationally proving memory access violations in Isabelle/HOL [J].
Ahmadi, Sharar ;
Dongol, Brijesh ;
Griffin, Matt .
SCIENCE OF COMPUTER PROGRAMMING, 2024, 234
[30]   Markov Chains and Markov Decision Processes in Isabelle/HOL [J].
Hoelzl, Johannes .
JOURNAL OF AUTOMATED REASONING, 2017, 59 (03) :345-387