Analysis of two authorization protocols using Colored Petri Nets

被引:4
|
作者
Seifi, Younes [1 ,2 ]
Suriadi, Suriadi [2 ]
Foo, Ernest [2 ]
Boyd, Colin [2 ]
机构
[1] Bu Ali Sina Univ, Hamadan, Iran
[2] Queensland Univ Technol, Brisbane, Qld 4001, Australia
关键词
Colored Petri Nets; CPN; CPN Tools; Security Analysis; TPM; SKAP; OSAP; Trusted Computing; ASK-CTL; VERIFICATION; ATTACK; LOGIC; TOOL;
D O I
10.1007/s10207-014-0243-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To prevent unauthorized access to protected trusted platform module (TPM) objects, authorization protocols, such as the object-specific authorization protocol (OSAP), have been introduced by the trusted computing group (TCG). By using OSAP, processes trying to gain access to the protected TPM objects need to prove their knowledge of relevant authorization data before access to the objects can be granted. Chen and Ryan's 2009 analysis has demonstrated OSAP's authentication vulnerability in sessions with shared authorization data. They also proposed the Session Key Authorization Protocol (SKAP) with fewer stages as an alternative to OSAP. Chen and Ryan's analysis of SKAP using ProVerif proves the authentication property. The purpose of this paper was to examine the usefulness of Colored Petri Nets (CPN) and CPN Tools for security analysis. Using OSAP and SKAP as case studies, we construct intruder and authentication property models in CPN. CPN Tools is used to verify the authentication property using a Dolev-Yao-based model. Verification of the authentication property in both models using the state space tool produces results consistent with those of Chen and Ryan.
引用
收藏
页码:221 / 247
页数:27
相关论文
共 50 条
  • [31] Translating active objects into colored Petri nets for communication analysis
    Gkolfi, Anastasia
    Din, Crystal Chang
    Johnsen, Einar Broch
    Kristensen, Lars Michael
    Steffen, Martin
    Yu, Ingrid Chieh
    SCIENCE OF COMPUTER PROGRAMMING, 2019, 181 : 1 - 26
  • [32] Manufacturing Scheduling Using Colored Petri Nets and Reinforcement Learning
    Drakaki, Maria
    Tzionas, Panagiotis
    APPLIED SCIENCES-BASEL, 2017, 7 (02):
  • [33] Performance Analysis of the ARIA Adaptive Media Processing Workflows using Colored Petri Nets
    Garelli, Maurizio
    Gribaudo, Marco
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 232 : 55 - 73
  • [34] Formal modeling and analysis of security schemes of RPL protocol using colored Petri nets
    Ahmad, Farooq
    Chaudhry, Muhammad Tayyab
    Jamal, Muhammad Hasan
    Sohail, Muhammad Amar
    Gavilanes, Daniel
    Masias Vergara, Manuel
    Ashraf, Imran
    PLOS ONE, 2023, 18 (08):
  • [35] Automated broken object-level authorization attack detection in REST APIs through OpenAPI to colored petri nets transformation
    Santos Filho, Ailton
    Rodriguez, Ricardo J.
    Feitosa, Eduardo L.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2025, 24 (02)
  • [36] Server consolidation for heterogeneous computer clusters using Colored Petri Nets and CPN Tools
    Al-Azzoni, Issam
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2015, 27 (04) : 376 - 385
  • [37] Creating executable models of influence nets with colored Petri nets
    Wagenhals L.W.
    Shin I.
    Levis A.H.
    International Journal on Software Tools for Technology Transfer, 1998, 2 (2) : 168 - 181
  • [38] Modeling inheritance anomaly in concurrent systems using colored Petri nets
    Bauskar, B
    Mikolajczak, B
    2004 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOLS 1-7, 2004, : 4873 - 4878
  • [39] An elastic controller using Colored Petri Nets in cloud computing environment
    Shahidinejad, Ali
    Ghobaei-Arani, Mostafa
    Esmaeili, Leila
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (02): : 1045 - 1071
  • [40] Modeling and Analysis of the 1-Wire Communication Protocol Using Timed Colored Petri Nets
    Emilia Cambronero, Maria
    Macia, Hermenegilda
    Valero, Valentin
    Orozco Barbosa, Luis
    IEEE ACCESS, 2018, 6 : 27356 - 27372