Automatic verification of security in payment protocols for electronic commerce

被引:0
作者
Panti, M [1 ]
Spalazzi, L [1 ]
Tacconi, S [1 ]
Valenti, S [1 ]
机构
[1] Univ Ancona, Ist Informat, Ancona, Italy
来源
ENTERPRISE INFORMATION SYSTEMS IV | 2002年
关键词
payment protocols; electronic commerce; security requirements; model checking; automatic verification; protocol attacks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to make secure transactions over computer networks, various cryptographic protocols have been proposed but, because of subtleties involved in their design, many of them have been shown to have flaws, even a long time after their publication. For this reason, several automatic verification methods for analyzing these protocols have been devised. The aim of this paper is to present a methodology for verifying security requirements of electronic payment protocols by means of NuSMV, a symbolic model checker. Our work principally focus on formal representation of security requirements. Indeed, we propose an extension of the correspondence property, so far used only for authentication, to other requirements as confidentiality and integrity. These are the basic security requirements of payment protocols for electronic commerce. We illustrate as case study a variant of the SET protocol proposed by Lu & Smolka. This variant has been formally verified by Ly & Smolka and considered secure. Conversely, we have discovered two attacks that allow a dishonest user to purchase a good debiting the amount to another user.
引用
收藏
页码:276 / 282
页数:7
相关论文
共 50 条
  • [1] Automatic verification of correspondences for security protocols
    Blanchet, Bruno
    JOURNAL OF COMPUTER SECURITY, 2009, 17 (04) : 363 - 434
  • [2] SYSTEMS OF SECURE PAYMENT. SECURITY IN ELECTRONIC COMMERCE
    Martinez Lopez, Luis
    Mata Mata, Francisco
    Rodriguez Dominguez, Rosa Ma
    REVISTA DE ESTUDIOS EMPRESARIALES-SEGUNDA EPOCA, 2009, (01): : 63 - 76
  • [3] SeVe: automatic tool for verification of security protocols
    Anh Tuan Luu
    Sun, Jun
    Liu, Yang
    Dong, Jin Song
    Li, Xiaohong
    Thanh Tho Quan
    FRONTIERS OF COMPUTER SCIENCE, 2012, 6 (01) : 57 - 75
  • [4] Initial Analysis on the Security of Electronic Commerce Payment Instrument
    Qu, Jiangbin
    Liu, Wei
    Cong, Feng
    2013 25TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2013, : 4037 - 4041
  • [5] SeVe: automatic tool for verification of security protocols
    Anh Tuan Luu
    Jun Sun
    Yang Liu
    Jin Song Dong
    Xiaohong Li
    Thanh Tho Quan
    Frontiers of Computer Science, 2012, 6 : 57 - 75
  • [6] Fair payment protocols for & commerce
    Wang, H
    Guo, HQ
    BUILDING THE E-SERVICE SOCIETY: E-COMMERCE, E-BUSINESS, AND E-GOVERNMENT, 2004, 146 : 227 - 245
  • [7] The Research on Electronic Commerce Security Payment System Based on Set Protocol
    Guo, Hongliang
    FOURTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2012), 2012, 8334
  • [8] Model checking the iKP electronic payment protocols
    Ogata, Kazuhiro
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 36 : 101 - 111
  • [9] Electronic card payment systems in electronic commerce
    Brahm, J
    Turban, E
    DECISION SCIENCES INSTITUTE 1998 PROCEEDINGS, VOLS 1-3, 1998, : 936 - 938
  • [10] Accountability in electronic commerce protocols
    Kailar, R
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1996, 22 (05) : 313 - 328