Analysis of two authorization protocols using Colored Petri Nets

被引:4
|
作者
Seifi, Younes [1 ,2 ]
Suriadi, Suriadi [2 ]
Foo, Ernest [2 ]
Boyd, Colin [2 ]
机构
[1] Bu Ali Sina Univ, Hamadan, Iran
[2] Queensland Univ Technol, Brisbane, Qld 4001, Australia
关键词
Colored Petri Nets; CPN; CPN Tools; Security Analysis; TPM; SKAP; OSAP; Trusted Computing; ASK-CTL; VERIFICATION; ATTACK; LOGIC; TOOL;
D O I
10.1007/s10207-014-0243-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To prevent unauthorized access to protected trusted platform module (TPM) objects, authorization protocols, such as the object-specific authorization protocol (OSAP), have been introduced by the trusted computing group (TCG). By using OSAP, processes trying to gain access to the protected TPM objects need to prove their knowledge of relevant authorization data before access to the objects can be granted. Chen and Ryan's 2009 analysis has demonstrated OSAP's authentication vulnerability in sessions with shared authorization data. They also proposed the Session Key Authorization Protocol (SKAP) with fewer stages as an alternative to OSAP. Chen and Ryan's analysis of SKAP using ProVerif proves the authentication property. The purpose of this paper was to examine the usefulness of Colored Petri Nets (CPN) and CPN Tools for security analysis. Using OSAP and SKAP as case studies, we construct intruder and authentication property models in CPN. CPN Tools is used to verify the authentication property using a Dolev-Yao-based model. Verification of the authentication property in both models using the state space tool produces results consistent with those of Chen and Ryan.
引用
收藏
页码:221 / 247
页数:27
相关论文
共 50 条
  • [41] Access Control Verification in Smart Contracts Using Colored Petri Nets
    Al-Azzoni, Issam
    Iqbal, Saqib
    COMPUTERS, 2024, 13 (11)
  • [42] An elastic controller using Colored Petri Nets in cloud computing environment
    Ali Shahidinejad
    Mostafa Ghobaei-Arani
    Leila Esmaeili
    Cluster Computing, 2020, 23 : 1045 - 1071
  • [43] Modeling workflow processes with colored Petri nets
    Liu, DS
    Wang, JM
    Chan, SCF
    Sun, JG
    Zhang, L
    COMPUTERS IN INDUSTRY, 2002, 49 (03) : 267 - 281
  • [44] Analyzing Web Service Choreography Specifications Using Colored Petri Nets
    Caliz, Enrique
    Umapathy, Karthikeyan
    Sanchez-Ruiz, Arturo J.
    Elfayoumy, Sherif A.
    SERVICE-ORIENTED PERSPECTIVES IN DESIGN SCIENCE RESEARCH: 6TH INTERNATIONAL CONFERENCE, 2011, 6629 : 412 - 426
  • [45] Modeling a Pharmaceutical Web-Service Using Colored Petri Nets
    Kalinina, Irina
    Gozhyj, Aleksandr
    Gozhyi, Victor
    2022 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND INFORMATION TECHNOLOGIES (CSIT), 2022, : 345 - 348
  • [46] Task Allocation Policy for UGV Systems using Colored Petri Nets
    Wang, Xiaojun
    Rui, Feng
    Hu, Hesuan
    2018 ANNUAL AMERICAN CONTROL CONFERENCE (ACC), 2018, : 3050 - 3055
  • [47] Modeling and Analysis of Maglev Communication System Based on Colored Petri Nets
    Jiao, Yibo
    Liu, Xiangqian
    Cui, Yibo
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT 2017), 2017, : 681 - 686
  • [48] Transforming Business Patterns to Colored Petri Nets using Graph Grammars
    Mahdi, Karima
    Elmansouri, Raida
    Chaoui, Allaoua
    2012 22ND INTERNATIONAL CONFERENCE ON COMPUTER THEORY AND APPLICATIONS (ICCTA), 2012, : 72 - 78
  • [49] Evaluation of Fault Tolerance in Cloud Computing using Colored Petri Nets
    Effatparvar, Mehdi
    Madani, Seyedeh Solmaz
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (07) : 340 - 346
  • [50] VERIFYING UCM SPECIFICATIONS OF DISTRIBUTED SYSTEMS USING COLORED PETRI NETS
    Vizovitin, N. V.
    Nepomniaschy, V. A.
    Stenenko, A. A.
    CYBERNETICS AND SYSTEMS ANALYSIS, 2015, 51 (02) : 213 - 222