Formal Analysis of QUIC Handshake Protocol Using Symbolic Model Checking

被引:12
|
作者
Zhang, Jingjing [1 ,2 ]
Yang, Lin [2 ]
Gao, Xianming [2 ]
Tang, Gaigai [3 ]
Zhang, Jiyong [4 ]
Wang, Qiang [2 ]
机构
[1] Army Engn Univ PLA, Coll Command & Control Engn, Nanjing 210007, Peoples R China
[2] PLA Acad Mil Sci, Inst Syst Engn, Natl Key Lab Sci & Technol Informat Syst Secur, Beijing 100039, Peoples R China
[3] Harbin Engn Univ, Coll Comp Sci & Technol, Harbin 150001, Peoples R China
[4] Hangzhou Dianzi Univ, Sch Automat, Hangzhou 310018, Peoples R China
关键词
Protocols; Cryptography; Analytical models; Model checking; Servers; Cryptographic protocols; Calculus; applied pi calculus; cryptographic protocol; QUIC; formal verification; ProVerif; Verifpal;
D O I
10.1109/ACCESS.2021.3052578
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work presents a security analysis of the QUIC handshake protocol based on symbolic model checking. As a newly proposed secure transport protocol, the purpose of QUIC is to improve the transport performance of HTTPS traffic and enable rapid deployment and evolution of transport mechanisms. QUIC is currently in the IETF standardization process and will potentially carry a significant portion of Internet traffic in the emerging future. For a better understanding of the essential security properties, we have developed a formal model of the QUIC handshake protocol and perform a comprehensive formal security analysis by using two state-of-the-art model checking tools for cryptographic protocols, i.e., ProVeirf and Verifpal. Our analysis shows that ProVerif is generally more powerful than Verifpal in terms of verifying authentication properties. Moreover, both tools produce a counterexample to some security properties, which reveal a design flaw in the current protocol specification. Last but not least, we analyze the root causes of this counterexample and suggest a possible fix.
引用
收藏
页码:14836 / 14848
页数:13
相关论文
共 50 条
  • [31] Analysing a stream authentication protocol using model checking
    Philippa Hopcroft
    Gavin Lowe
    International Journal of Information Security, 2004, 3 (1) : 2 - 13
  • [32] An improved formal model of cryptographic protocol
    Institute of Electronic Technology, PLA Information Engineering University, Zhengzhou 450004, China
    Ruan Jian Xue Bao, 2007, 7 (1746-1755): : 1746 - 1755
  • [33] A Candid Industrial Evaluation of Formal Software Verification using Model Checking
    Bennion, Matthew
    Habli, Ibrahim
    36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE COMPANION 2014), 2014, : 175 - 184
  • [34] Formal analysis of production line systems by probabilistic model checking tools
    Ballarini, Paolo
    Horvath, Andras
    2021 26TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2021,
  • [35] Formal Verification for SpaceWire Data Flow Control Using Model Checking
    Hua, Wei
    Li, Xiaojuan
    Guan, Yong
    Shi, Zhiping
    Zhang, Jie
    Dong, Lingling
    INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS, PTS 1-4, 2013, 241-244 : 2466 - +
  • [37] TLA+ Model Checking Made Symbolic
    Konnov, Igor
    Kukovec, Jure
    Tran, Thanh-Hai
    PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2019, 3 (OOPSLA):
  • [38] MOXI: An Intermediate Language for Symbolic Model Checking
    Rozier, Kristin Yvonne
    Dureja, Rohit
    Irfan, Ahmed
    Johannsen, Chris
    Nukala, Karthik
    Shankar, Natarajan
    Tinelli, Cesare
    Vardi, Moshe Y.
    MODEL CHECKING SOFTWARE, SPIN 2024, 2025, 14624 : 26 - 46
  • [39] Symbolic model checking of public announcement protocols
    Charrier, Tristan
    Pinchinat, Sophie
    Schwarzentruber, Francois
    JOURNAL OF LOGIC AND COMPUTATION, 2019, 29 (08) : 1211 - 1249