A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and its Application to Fair Exchange

被引:12
作者
Backes, Michael [1 ,5 ]
Dreier, Jannik [2 ,3 ,4 ]
Kremer, Steve [2 ,3 ,4 ]
Kuennemann, Robert [1 ]
机构
[1] Saarland Univ, CISPA, Saarland Informat Campus, Saarbrucken, Germany
[2] Inria Nancy Grand Est, LORIA, Villers Les Nancy, France
[3] CNRS, Paris, France
[4] Univ Lorraine, Nancy, France
[5] MPI SWS, Saarland Informat Campus, Saarbrucken, Germany
来源
2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P) | 2017年
基金
欧洲研究理事会;
关键词
D O I
10.1109/EuroSP.2017.12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we provide the first methodology for reasoning about liveness properties of cryptographic protocols in a machine-assisted manner without imposing any artificial, finite bounds on the protocols and execution models. To this end, we design an extension of the SAPiC process calculus so that it supports key concepts for stating and reasoning about liveness properties, along with a corresponding translation into the formalism of multiset rewriting that the state-of-the-art theorem prover Tamarin relies upon. We prove that this translation is sound and complete and can thereby automatically generate sound Tamarin specifications and automate the protocol analysis. Second, we applied our methodology to two widely investigated fair exchange protocols - ASW and GJM - and to the Secure Conversation Protocol standard for industrial control systems, deployed by major players such as Siemens, SAP and ABB. For the fair exchange protocols, we not only re-discovered known attacks, but also uncovered novel attacks that previous analyses based on finite models and a restricted number of sessions did not detect. We suggest fixed versions of these protocols for which we prove both fairness and timeliness, yielding the first automated proofs for fair exchange protocols that rely on a general model without restricting the number of sessions and message size. For the Secure Conversation Protocol, we prove several strong security properties that are vital for the safety of industrial systems, in particular that all messages (e.g., commands) are eventually delivered in order.
引用
收藏
页码:76 / 91
页数:16
相关论文
共 29 条
[1]   Mobile values, new names, and secure communication [J].
Abadi, M ;
Fournet, C .
ACM SIGPLAN NOTICES, 2001, 36 (03) :104-115
[2]  
[Anonymous], 2012, OPC UN ARCH SPEC 6
[3]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[4]   Asynchronous protocols for optimistic fair exchange [J].
Asokan, N ;
Shoup, V ;
Waidner, M .
1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1998, :86-99
[5]  
Backes Michael, NOVEL APPROACH REASO
[6]   Automated Symbolic Proofs of Observational Equivalence [J].
Basin, David ;
Dreier, Jannik ;
Sasse, Ralf .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :1144-1155
[7]  
Blanchet B, 2005, IEEE S LOG, P331
[8]  
Blanchet B., 2013, PROVERIF 1 88 AUTOMA
[9]  
Cederquist J, 2006, P FMSE 2006, P23
[10]  
Chadha R, 2003, LECT NOTES COMPUT SC, V2761, P366