Rule-based dependency models for security protocol analysis

被引:0
作者
Chen, Qingfeng [1 ]
Zhang, Shichao [2 ]
Chen, Yi-Ping Phoebe [1 ]
机构
[1] Deakin Univ, Fac Sci & Technol, Buwood, Vic 3125, Australia
[2] Univ Technol Sydney, Fac Informat Technol, Sydney, NSW 2007, Australia
基金
澳大利亚研究理事会;
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security protocol analysis has been discussed for quite some time in the past few years. Although formal methods have been widely used to identify various vulnerabilities, mainly susceptibility to freshness attacks and impersonation, the arisen inconsistent data between principals and collusion attacks held by a group of dishonest principals have been largely ignored. Moreover, the previous methods focus on reasoning about certain security-related properties and detecting known attacks against secure message, whereas there have been insufficient efforts to handle the above hidden but powerful attacks. In this paper, we address these critical issues and prove the efficiency and intuitiveness of rule-based dependency models in defending a protocol against the attacks. This is able to provide a numerical estimation to measure he occurrence of these attacks. It will be useful in enhancing the current protocol analysis.
引用
收藏
页码:369 / 380
页数:12
相关论文
共 25 条
[1]   Secrecy by typing in security protocols [J].
Abadi, M .
JOURNAL OF THE ACM, 1999, 46 (05) :749-786
[2]  
Agrawal R., 1993, SIGMOD Record, V22, P207, DOI 10.1145/170036.170072
[3]  
ALEX G, 2006, P 10 INT DAT ENG APP, P121
[4]  
[Anonymous], 2000, Privacy-preserving data mining, DOI DOI 10.1145/342009.335438
[5]   Collusion-secure fingerprinting for digital data [J].
Boneh, D ;
Shaw, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (05) :1897-1905
[6]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[7]  
Celik MU, 2003, IEEE IMAGE PROC, P509
[8]  
Chen QF, 2005, LECT NOTES ARTIF INT, V3809, P245
[9]  
Chen QF, 2006, LECT NOTES COMPUT SC, V3841, P297
[10]  
CHEN QF, 2006, KNOWL INF SYST, V7, P84