Formal Analysis of QUIC Handshake Protocol Using Symbolic Model Checking

被引:12
|
作者
Zhang, Jingjing [1 ,2 ]
Yang, Lin [2 ]
Gao, Xianming [2 ]
Tang, Gaigai [3 ]
Zhang, Jiyong [4 ]
Wang, Qiang [2 ]
机构
[1] Army Engn Univ PLA, Coll Command & Control Engn, Nanjing 210007, Peoples R China
[2] PLA Acad Mil Sci, Inst Syst Engn, Natl Key Lab Sci & Technol Informat Syst Secur, Beijing 100039, Peoples R China
[3] Harbin Engn Univ, Coll Comp Sci & Technol, Harbin 150001, Peoples R China
[4] Hangzhou Dianzi Univ, Sch Automat, Hangzhou 310018, Peoples R China
关键词
Protocols; Cryptography; Analytical models; Model checking; Servers; Cryptographic protocols; Calculus; applied pi calculus; cryptographic protocol; QUIC; formal verification; ProVerif; Verifpal;
D O I
10.1109/ACCESS.2021.3052578
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work presents a security analysis of the QUIC handshake protocol based on symbolic model checking. As a newly proposed secure transport protocol, the purpose of QUIC is to improve the transport performance of HTTPS traffic and enable rapid deployment and evolution of transport mechanisms. QUIC is currently in the IETF standardization process and will potentially carry a significant portion of Internet traffic in the emerging future. For a better understanding of the essential security properties, we have developed a formal model of the QUIC handshake protocol and perform a comprehensive formal security analysis by using two state-of-the-art model checking tools for cryptographic protocols, i.e., ProVeirf and Verifpal. Our analysis shows that ProVerif is generally more powerful than Verifpal in terms of verifying authentication properties. Moreover, both tools produce a counterexample to some security properties, which reveal a design flaw in the current protocol specification. Last but not least, we analyze the root causes of this counterexample and suggest a possible fix.
引用
收藏
页码:14836 / 14848
页数:13
相关论文
共 50 条
  • [41] Conformance Checking using Formal Methods
    Santone, Antonella
    Vaglini, Gigliola
    ICSOFT-EA: PROCEEDINGS OF THE 11TH INTERNATIONAL JOINT CONFERENCE ON SOFTWARE TECHNOLOGIES - VOL. 1, 2016, : 258 - 263
  • [42] Formal Verification of Signature-monitoring Mechanisms by Model Checking
    Tan, Lanfang
    Tan, Qingping
    Xu, Jianjun
    Zhou, Huiping
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2012, 9 (04) : 1431 - 1451
  • [43] Formal Verification for Interaction Protocol in Agent-Based E-Learning System Using Model Checking Toolkit - MCMAS
    Latif, Norizal Abd
    Hassan, Mohd Fadzil
    Hasan, Mohd Hilmi
    SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 2, 2011, 180 : 412 - 426
  • [44] Abstraction-guided model checking using symbolic IDA* and heuristic synthesis
    Qian, KR
    Nymeyer, A
    Susanto, S
    FORMAL TECHNIQUES FOR NETWORKED AND DISTRIBUTED SYSTEMS - FORTE 2005, 2005, 3731 : 275 - 289
  • [45] Coverage estimation using transition perturbation for symbolic model checking in hardware verification
    Xu, Xingwen
    Kimura, Shinji
    Horikawa, Kazunari
    Tsuchiya, Takehiko
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (12) : 3451 - 3457
  • [46] Model Checking the IKEv2 Protocol Using Spin
    Ninet, Tristan
    Legay, Axel
    Maillard, Romaric
    Traonouez, Louis-Marie
    Zendra, Olivier
    2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2019, : 288 - 294
  • [47] Towards Validation of TLS 1.3 Formal Model and Vulnerabilities in Intel's RA-TLS Protocol
    Sardar, Muhammad Usama
    Niemi, Arto
    Tschofenig, Hannes
    Fossati, Thomas
    IEEE ACCESS, 2024, 12 : 173670 - 173685
  • [48] Security analysis of TLS protocol implementations based on model checking
    Bi X.
    Tang C.
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2021, 43 (03): : 839 - 846
  • [49] Interoperability-Guided Testing of QUIC Implementations using Symbolic Execution
    Rath, Felix
    Schemmel, Daniel
    Wehrle, Klaus
    EPIQ'18: PROCEEDINGS OF THE 2018 WORKSHOP ON THE EVOLUTION, PERFORMANCE, AND INTEROPERABILITY OF QUIC, 2018, : 15 - 21
  • [50] A Short Introduction to Two Approaches in Formal Verification of Security Protocols: Model Checking and Theorem Proving
    Pourpouneh, Mohsen
    Ramezanian, Rasoul
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 8 (01): : 3 - 24