Developing Security Protocols by Refinement

被引:12
|
作者
Sprenger, Christoph [1 ]
Basin, David [1 ]
机构
[1] Swiss Fed Inst Technol, Dept Comp Sci, Zurich, Switzerland
来源
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10) | 2010年
关键词
Security protocols; stepwise refinement; formal development; entity authentication; key establishment; KEY; MODELS;
D O I
10.1145/1866307.1866349
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides the transformation of abstract security goals into protocols that are secure when operating over an insecure channel controlled by a Dolev-Yao-style intruder. The refinement steps successively introduce local states, an intruder, communication channels with security properties, and cryptographic operations realizing these channels. The abstractions used provide insights on how the protocols work and foster the development of families of protocols sharing a common structure and properties. In contrast to post-hoc verification methods, protocols are developed together with their correctness proofs. We have implemented our method in Isabelle/HOL and used it to develop different entity authentication and key transport protocols.
引用
收藏
页码:361 / 374
页数:14
相关论文
共 50 条
  • [21] Formal Reasoning on Authentication in Security Protocols
    Fattahi, Jaouhar
    Mejri, Mohamed
    Ghayoula, Ridha
    Pricop, Emil
    2016 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2016, : 282 - 289
  • [22] Middleware for Automated Implementation of Security Protocols
    Genge, Bela
    Haller, Piroska
    SEMANTIC WEB: RESEARCH AND APPLICATIONS, 2009, 5554 : 476 - 490
  • [23] Semantics and logic Efor security protocols
    Jacobs, Bart
    Hasuo, Ichiro
    JOURNAL OF COMPUTER SECURITY, 2009, 17 (06) : 909 - 944
  • [24] A framework for compositional verification of security protocols
    Andova, Suzana
    Cremers, Cas
    Gjosteen, Kristian
    Mauw, Sjouke
    Mjolsnes, Stig F.
    Radomirovic, Saga
    INFORMATION AND COMPUTATION, 2008, 206 (2-4) : 425 - 459
  • [25] A Logic for Signature based Security Protocols
    Feng, Chao
    Chen, Yuebing
    Zhang, Quan
    Tang, Chaojing
    ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2010, : 99 - 105
  • [26] Using Interpolation for the Verification of Security Protocols
    Rocchetto, Marco
    Vigano, Luca
    Volpe, Marco
    Vedove, Giacomo Dalle
    SECURITY AND TRUST MANAGEMENT, STM 2013, 2013, 8203 : 99 - 114
  • [27] A (restricted) quantifier elimination for security protocols
    Ramanujam, R.
    Suresh, S. P.
    THEORETICAL COMPUTER SCIENCE, 2006, 367 (1-2) : 228 - 256
  • [28] Complexity of Security Protocols Verification Tools
    Mazur, Michal
    Kurkowski, Miroslaw
    2019 IEEE 15TH INTERNATIONAL SCIENTIFIC CONFERENCE ON INFORMATICS (INFORMATICS 2019), 2019, : 403 - 408
  • [29] Typing Messages for Free in Security Protocols
    Chretien, Remy
    Cortier, Veronique
    Dallon, Antoine
    Delaune, Stephanie
    ACM TRANSACTIONS ON COMPUTATIONAL LOGIC, 2020, 21 (01)
  • [30] Gaining Trust by Tracing Security Protocols
    Fredlund, Lars-Ake
    Benac Earle, Clara
    Arts, Thomas
    Svensson, Hans
    ERLANG '19: PROCEEDINGS OF THE 18TH ACM SIGPLAN INTERNATIONAL WORKSHOP ON ERLANG, 2019, : 56 - 67