Developing Security Protocols by Refinement

被引:12
|
作者
Sprenger, Christoph [1 ]
Basin, David [1 ]
机构
[1] Swiss Fed Inst Technol, Dept Comp Sci, Zurich, Switzerland
来源
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10) | 2010年
关键词
Security protocols; stepwise refinement; formal development; entity authentication; key establishment; KEY; MODELS;
D O I
10.1145/1866307.1866349
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides the transformation of abstract security goals into protocols that are secure when operating over an insecure channel controlled by a Dolev-Yao-style intruder. The refinement steps successively introduce local states, an intruder, communication channels with security properties, and cryptographic operations realizing these channels. The abstractions used provide insights on how the protocols work and foster the development of families of protocols sharing a common structure and properties. In contrast to post-hoc verification methods, protocols are developed together with their correctness proofs. We have implemented our method in Isabelle/HOL and used it to develop different entity authentication and key transport protocols.
引用
收藏
页码:361 / 374
页数:14
相关论文
共 50 条
  • [41] Hardware Cost Measurement of Lightweight Security Protocols
    Pekka Jäppinen
    Mikko Lampi
    Wireless Personal Communications, 2013, 71 : 1479 - 1486
  • [42] Security protocols protection based on anomaly detection
    Alharby, A
    Imai, H
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2006, E89D (01): : 189 - 200
  • [43] Distributed Partial Order Reduction for Security Protocols
    Dashti, M. Torabi
    Wijs, A.
    Lisser, B.
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2008, 198 (01) : 93 - 99
  • [44] Verifying security Protocols modelled by networks of automata
    Kurkowski, Miroslaw
    Penczek, Wojciech
    FUNDAMENTA INFORMATICAE, 2007, 79 (3-4) : 453 - 471
  • [45] Synthesising End-to-End Security Protocols
    Thevathayan, Charles
    Bertok, Peter
    Fernandez, George
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 440 - 447
  • [46] Parallel Bounded Model Checking of Security Protocols
    Kurkowski, Miroslaw
    Siedlecka-Lamch, Olga
    Szymoniak, Sabina
    Piech, Henryk
    PARALLEL PROCESSING AND APPLIED MATHEMATICS (PPAM 2013), PT I, 2014, 8384 : 224 - 234
  • [47] SeVe: automatic tool for verification of security protocols
    Anh Tuan Luu
    Jun Sun
    Yang Liu
    Jin Song Dong
    Xiaohong Li
    Thanh Tho Quan
    Frontiers of Computer Science, 2012, 6 : 57 - 75
  • [48] Security and privacy protocols for perceptual image hashing
    Hu, Donghui
    Su, Bin
    Zheng, Shuli
    Zhao, Zhong-Qiu
    Wu, Xintao
    Wu, Xindong
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2015, 17 (03) : 146 - 162
  • [49] LTL model-checking for security protocols
    Carbone, Roberto
    AI COMMUNICATIONS, 2011, 24 (03) : 281 - 283
  • [50] DELP: Dynamic Epistemic Logic for Security Protocols
    Leustean, Ioana
    Macovei, Bogdan
    2021 23RD INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2021), 2021, : 275 - 282