Synthesis of winning attacks on communication protocols using supervisory control theory: two case studies

被引:5
作者
Matsui, Shoma [1 ]
Lafortune, Stephane [2 ]
机构
[1] Queens Univ, Dept Elect & Comp Engn, Kingston, ON, Canada
[2] Univ Michigan, Dept Elect Engn & Comp Sci, Ann Arbor, MI 48109 USA
来源
DISCRETE EVENT DYNAMIC SYSTEMS-THEORY AND APPLICATIONS | 2022年 / 32卷 / 04期
关键词
Distributed protocols; Person-in-the-middle attacks; Supervisory control; Alternating bit protocol; transmission control protocol; DISCRETE-EVENT SYSTEMS;
D O I
10.1007/s10626-022-00369-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There is an increasing need to study the vulnerability of communication protocols in distributed systems to malicious attacks that attempt to violate properties such as safety or nonblockingness. In this paper, we propose a common methodology for formal synthesis of successful attacks against two well-known protocols, the Alternating Bit Protocol (ABP) and the Transmission Control Protocol (TCP), where the attacker can always eventually win, called For-all attacks. This extends previous work on the synthesis of There-exists attacks for TCP, where the attacker can sometimes win. We model the ABP and TCP protocols and system architecture by finite-state automata and employ the supervisory control theory of discrete event systems to pose and solve the synthesis of For-all attacks, where the attacker has partial observability and controllability of the system events. We consider several scenarios of person-in-the-middle attacks against ABP and TCP and present the results of attack synthesis using our methodology for each case.
引用
收藏
页码:573 / 610
页数:38
相关论文
共 29 条
[1]  
Alur R., 2017, SIGACT News, V48, P55
[2]   Detection of Design Flaws in the Android Permission Protocol Through Bounded Verification [J].
Bagheri, Hamid ;
Kang, Eunsuk ;
Malek, Sam ;
Jackson, Daniel .
FM 2015: FORMAL METHODS, 2015, 9109 :73-89
[3]  
Baier C, 2008, PRINCIPLES OF MODEL CHECKING, P1
[4]   FORMULAS FOR CALCULATING SUPREMAL CONTROLLABLE AND NORMAL SUBLANGUAGES [J].
BRANDT, RD ;
GARG, V ;
KUMAR, R ;
LIN, F ;
MARCUS, SI ;
WONHAM, WM .
SYSTEMS & CONTROL LETTERS, 1990, 15 (02) :111-117
[5]   Detection and mitigation of classes of attacks in supervisory control systems [J].
Carvalho, Lilian Kawakami ;
Wu, Yi-Chin ;
Kwong, Raymond ;
Lafortune, Stephane .
AUTOMATICA, 2018, 97 :121-133
[6]  
Cassandras C.G., 2009, INTRO DISCRETE EVENT, V2nd ed.
[7]   Supervisory control and reactive synthesis: a comparative introduction [J].
Ehlers, Ruediger ;
Lafortune, Stephane ;
Tripakis, Stavros ;
Vardi, Moshe Y. .
DISCRETE EVENT DYNAMIC SYSTEMS-THEORY AND APPLICATIONS, 2017, 27 (02) :209-260
[8]  
Hangju Cho, 1989, Mathematics of Control, Signals, and Systems, V2, P47, DOI 10.1007/BF02551361
[9]  
Holzmann G. J., 1991, DESIGN VALIDATION CO
[10]   Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations [J].
Jero, Samuel ;
Lee, Hyojeong ;
Nita-Rotaru, Cristina .
2015 45TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, 2015, :1-12