A SAT-Based Planning Approach for Finding Logical Attacks on Cryptographic Protocols

被引:0
作者
Aribi, Noureddine [1 ]
Lebbah, Yahia [1 ]
机构
[1] Univ Oran 1, LITIO Lab, Oran, Algeria
关键词
Cryptography; Formal Verification; Logical Attacks; Model Checking; PDDL; Planning; SAT Solvers; Security Protocols; SECURITY; AUTHENTICATION; GRAPH;
D O I
10.4018/IJISP.2020100101
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cryptographic protocols form the backbone of digital society. They are concurrent multiparty communication protocols that use cryptography to achieve security goals such as confidentiality, authenticity, integrity, etc., in the presence of adversaries. Unfortunately, protocol verification still represents a critical task and a major cost to engineer attack-free security protocols. Model checking and SAT-based techniques proved quite effective in this context. This article proposes an efficient automatic model checking approach that exemplifies a security property violation. In this approach, a protocol verification is abstracted as a compact planning problem, which is efficiently solved by a state-of-the-art SAT solver. The experiments performed on some real-world cryptographic protocols succeeded in detecting new logical attacks, violating some security properties. Those attacks encompass both "type flaw" and "replay" attacks, which are difficult to tackle with the existing planning-based approaches.
引用
收藏
页码:1 / 21
页数:21
相关论文
共 24 条
[1]  
[Anonymous], 2005, THESIS U STUDI GENOV
[2]  
Aribi N., 2008, JFPC 2008 4 JOURN FR, P21
[3]  
Armando A., 2014, SATMC SAT BASED MODE
[4]  
Basin D. A., 2018, Handbook of Model Checking, P727
[5]  
Ben S., 2011, THESIS
[6]  
Blanchet B, 2002, LECT NOTES COMPUT SC, V2477, P342
[7]   An efficient cryptographic protocol verifier based on prolog rules [J].
Blanchet, B .
14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2001, :82-96
[8]   Fast planning through planning graph analysis [J].
Blum, AL ;
Furst, ML .
ARTIFICIAL INTELLIGENCE, 1997, 90 (1-2) :281-300
[9]   Verifying security protocols with Brutus [J].
Clarke, EM ;
Jha, S ;
Marrero, W .
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2000, 9 (04) :443-487
[10]   A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems [J].
Cortier, Veronique ;
Kremer, Steve ;
Warinschi, Bogdan .
JOURNAL OF AUTOMATED REASONING, 2011, 46 (3-4) :225-259