Formal Analysis of QUIC Handshake Protocol Using Symbolic Model Checking

被引:12
|
作者
Zhang, Jingjing [1 ,2 ]
Yang, Lin [2 ]
Gao, Xianming [2 ]
Tang, Gaigai [3 ]
Zhang, Jiyong [4 ]
Wang, Qiang [2 ]
机构
[1] Army Engn Univ PLA, Coll Command & Control Engn, Nanjing 210007, Peoples R China
[2] PLA Acad Mil Sci, Inst Syst Engn, Natl Key Lab Sci & Technol Informat Syst Secur, Beijing 100039, Peoples R China
[3] Harbin Engn Univ, Coll Comp Sci & Technol, Harbin 150001, Peoples R China
[4] Hangzhou Dianzi Univ, Sch Automat, Hangzhou 310018, Peoples R China
关键词
Protocols; Cryptography; Analytical models; Model checking; Servers; Cryptographic protocols; Calculus; applied pi calculus; cryptographic protocol; QUIC; formal verification; ProVerif; Verifpal;
D O I
10.1109/ACCESS.2021.3052578
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work presents a security analysis of the QUIC handshake protocol based on symbolic model checking. As a newly proposed secure transport protocol, the purpose of QUIC is to improve the transport performance of HTTPS traffic and enable rapid deployment and evolution of transport mechanisms. QUIC is currently in the IETF standardization process and will potentially carry a significant portion of Internet traffic in the emerging future. For a better understanding of the essential security properties, we have developed a formal model of the QUIC handshake protocol and perform a comprehensive formal security analysis by using two state-of-the-art model checking tools for cryptographic protocols, i.e., ProVeirf and Verifpal. Our analysis shows that ProVerif is generally more powerful than Verifpal in terms of verifying authentication properties. Moreover, both tools produce a counterexample to some security properties, which reveal a design flaw in the current protocol specification. Last but not least, we analyze the root causes of this counterexample and suggest a possible fix.
引用
收藏
页码:14836 / 14848
页数:13
相关论文
共 50 条
  • [1] Formal analysis of QUIC handshake protocol using ProVerif
    Zhang, Jingjing
    Yang, Lin
    Gao, Xianming
    Wang, Qiang
    2020 7TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD 2020)/2020 6TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (EDGECOM 2020), 2020, : 132 - 138
  • [2] Formal verification of digital circuits using symbolic model checking
    Casar, A
    Brezocnik, Z
    Kapus, T
    INFORMACIJE MIDEM-JOURNAL OF MICROELECTRONICS ELECTRONIC COMPONENTS AND MATERIALS, 2000, 30 (03): : 153 - 160
  • [3] Formal security analysis of Ariadne secure routing protocol using model checking
    Onem, E.
    Gurdag, A. Burak
    Caglayan, M. Ufuk
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2012, 9 (01) : 12 - 24
  • [4] A symbolic model checking approach in formal verification of distributed systems
    Souri, Alireza
    Rahmani, Amir Masoud
    Navimipour, Nima Jafari
    Rezaei, Reza
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2019, 9 (01):
  • [5] An Empirical Approach to Evaluate the Resilience of QUIC Protocol against Handshake Flood Attacks
    Teyssier, Benjamin
    Joarder, Y. A.
    Fung, Carol
    2023 19TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT, CNSM, 2023,
  • [6] Formal Specification and Model Checking of an Autonomous Vehicle Merging Protocol
    Liu, Minxuan
    Dang Duy Bui
    Duong Dinh Tran
    Ogata, Kazuhiro
    2021 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C 2021), 2021, : 333 - 342
  • [7] Formal Analysis of 5G EAP-TLS Authentication Protocol Using Proverif
    Zhang, Jingjing
    Yang, Lin
    Cao, Weipeng
    Wang, Qiang
    IEEE ACCESS, 2020, 8 : 23674 - 23688
  • [8] Formal analysis for robust anti-SPIT protection using model checking
    Gritzalis, Dimitris
    Katsaros, Panagiotis
    Basagiannis, Stylianos
    Soupionis, Yannis
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2012, 11 (02) : 121 - 135
  • [9] Formal analysis for robust anti-SPIT protection using model checking
    Dimitris Gritzalis
    Panagiotis Katsaros
    Stylianos Basagiannis
    Yannis Soupionis
    International Journal of Information Security, 2012, 11 : 121 - 135
  • [10] Symbolic PathFinder: integrating symbolic execution with model checking for Java bytecode analysis
    Corina S. Păsăreanu
    Willem Visser
    David Bushnell
    Jaco Geldenhuys
    Peter Mehlitz
    Neha Rungta
    Automated Software Engineering, 2013, 20 : 391 - 425