Automatic verification of security in payment protocols for electronic commerce

被引:0
作者
Panti, M [1 ]
Spalazzi, L [1 ]
Tacconi, S [1 ]
Valenti, S [1 ]
机构
[1] Univ Ancona, Ist Informat, Ancona, Italy
来源
ENTERPRISE INFORMATION SYSTEMS IV | 2002年
关键词
payment protocols; electronic commerce; security requirements; model checking; automatic verification; protocol attacks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to make secure transactions over computer networks, various cryptographic protocols have been proposed but, because of subtleties involved in their design, many of them have been shown to have flaws, even a long time after their publication. For this reason, several automatic verification methods for analyzing these protocols have been devised. The aim of this paper is to present a methodology for verifying security requirements of electronic payment protocols by means of NuSMV, a symbolic model checker. Our work principally focus on formal representation of security requirements. Indeed, we propose an extension of the correspondence property, so far used only for authentication, to other requirements as confidentiality and integrity. These are the basic security requirements of payment protocols for electronic commerce. We illustrate as case study a variant of the SET protocol proposed by Lu & Smolka. This variant has been formally verified by Ly & Smolka and considered secure. Conversely, we have discovered two attacks that allow a dishonest user to purchase a good debiting the amount to another user.
引用
收藏
页码:276 / 282
页数:7
相关论文
共 50 条
  • [21] Legal guarantee of the security of electronic commerce
    Tian, H
    Qiao, YZ
    2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : F167 - F170
  • [22] The Application of image security to Electronic Commerce
    Chen, Yu
    AUTOMATION EQUIPMENT AND SYSTEMS, PTS 1-4, 2012, 468-471 : 2908 - 2911
  • [23] A security architecture for electronic commerce applications
    De Win, B
    Van den Bergh, J
    Matthijs, F
    De Decker, B
    Joosen, W
    INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 491 - 500
  • [24] Realization of Information Security in Electronic Commerce
    Li Fu-Guo
    Dong Yu-Jie
    THIRD INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2010), 2010, : 14 - 16
  • [25] Research on the Security System of Electronic Commerce
    He Quanxiu
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE OF MANAGEMENT SCIENCE AND INFORMATION SYSTEM, VOLS 1-4, 2009, : 161 - 164
  • [26] Formal Verification of Security Protocols Using Spin
    Chen, Shengbo
    Fu, Hao
    Miao, Huaikou
    2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2016, : 637 - 642
  • [27] Research on Electronic Cash Security Technology in Electronic Commerce
    Gong, Songjie
    Jin, Lindi
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1628 - 1631
  • [28] Research on Electronic Commerce Payment System in Wuhan Metropolitan Area
    Lin, Xiang
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 596 - 599
  • [29] Electronic Commerce Technology and its Security Problems
    Ma, Xinqiang
    Liu, Youyuan
    2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 631 - 634
  • [30] Intelligence Computing Methods in Electronic Commerce and Security
    Zhang, Jing
    PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I, 2009, : 398 - 402