Pitfalls in Formal Reasoning about Security Protocols

被引:2
|
作者
Moebius, Nina [1 ]
Stenzel, Kurt [1 ]
Reif, Wolfgang [1 ]
机构
[1] Univ Augsburg, Inst Software & Syst Engn, D-8900 Augsburg, Germany
来源
FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS | 2010年
关键词
formal verification; security protocols;
D O I
10.1109/ARES.2010.36
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Formal verification can give more confidence in the security of cryptographic protocols. Application specific security properties like "The service provider does not loose money" can give even more confidence than standard properties like secrecy or authentication. However, it is surprisingly easy to get a meaningful property slightly wrong. The result is that an insecure protocol can be 'proven' secure. We illustrate the problem with a very small application, a copy card, that has only five different messages. The example is taken from a paper where the protocol is secure, but the proved property slightly wrong. We propose to solve the problem by incorporating more of the real-world application into the formal model.
引用
收藏
页码:248 / 253
页数:6
相关论文
共 50 条
  • [1] Formal Reasoning on Authentication in Security Protocols
    Fattahi, Jaouhar
    Mejri, Mohamed
    Ghayoula, Ridha
    Pricop, Emil
    2016 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2016, : 282 - 289
  • [2] Prolog-Based Formal Reasoning for Security Protocols
    Jiang, Rongrong
    Wang, Chuanbin
    Xu, Jiejie
    Yu, Jiangfen
    PARALLEL AND DISTRIBUTED COMPUTING AND NETWORKS, 2011, 137 : 71 - +
  • [3] Toward Reasoning about Security Protocols: A Semantic Approach
    Hommersom, Arjen
    Meyer, John-Jules
    de Vink, Erik
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 126 : 53 - 75
  • [4] Using Automated Model Analysis for Reasoning about Security of Web Protocols
    Kumar, Apurva
    28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), 2012, : 289 - 298
  • [5] Observational equivalence and security games: Enhancing the formal analysis of security protocols
    Cai, Liujia
    Cai, Guangying
    Lu, Siqi
    Li, Guangsong
    Wang, Yongjuan
    COMPUTERS & SECURITY, 2024, 140
  • [6] Formal verification: an imperative step in the design of security protocols
    Coffey, T
    Dojen, R
    Flanagan, T
    COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2003, 43 (05): : 601 - 618
  • [7] Formal Reasoning for Security Protocol Correctness
    Adi, Kamel
    Pene, Liviu
    NEW TRENDS IN SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 2008, 182 : 63 - +
  • [8] A formal framework for security analysis of NFC mobile coupon protocols
    Alshehri, Ali
    Schneider, Steve
    JOURNAL OF COMPUTER SECURITY, 2015, 23 (06) : 685 - 707
  • [9] Formal Verification of Security Protocols Using Spin
    Chen, Shengbo
    Fu, Hao
    Miao, Huaikou
    2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2016, : 637 - 642
  • [10] Formal Verification of Security Protocols: ProVerif and Extensions
    Yao, Jiangyuan
    Xu, Chunxiang
    Li, Deshun
    Lin, Shengjun
    Cao, Xingcan
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT II, 2022, 13339 : 500 - 512