Automatic verification of security in payment protocols for electronic commerce

被引:0
作者
Panti, M [1 ]
Spalazzi, L [1 ]
Tacconi, S [1 ]
Valenti, S [1 ]
机构
[1] Univ Ancona, Ist Informat, Ancona, Italy
来源
ENTERPRISE INFORMATION SYSTEMS IV | 2002年
关键词
payment protocols; electronic commerce; security requirements; model checking; automatic verification; protocol attacks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to make secure transactions over computer networks, various cryptographic protocols have been proposed but, because of subtleties involved in their design, many of them have been shown to have flaws, even a long time after their publication. For this reason, several automatic verification methods for analyzing these protocols have been devised. The aim of this paper is to present a methodology for verifying security requirements of electronic payment protocols by means of NuSMV, a symbolic model checker. Our work principally focus on formal representation of security requirements. Indeed, we propose an extension of the correspondence property, so far used only for authentication, to other requirements as confidentiality and integrity. These are the basic security requirements of payment protocols for electronic commerce. We illustrate as case study a variant of the SET protocol proposed by Lu & Smolka. This variant has been formally verified by Ly & Smolka and considered secure. Conversely, we have discovered two attacks that allow a dishonest user to purchase a good debiting the amount to another user.
引用
收藏
页码:276 / 282
页数:7
相关论文
共 50 条
[31]   Research on transaction security in electronic commerce engineering [J].
Liu, SD ;
Yang, L ;
Wang, JX .
THIRD INTERNATIONAL CONFERENCE ON ELECTRONIC COMMERCE ENGINEERING: DIGITAL ENTERPRISES AND NONTRADITIONAL INDUSTRIALIZATION, 2003, :620-622
[32]   Holistic security requirement engineering for electronic commerce [J].
Zuccato, A .
COMPUTERS & SECURITY, 2004, 23 (01) :63-76
[33]   The application of information security technology in electronic commerce [J].
Chen, Xinyi .
2017 2ND INTERNATIONAL CONFERENCE ON MECHATRONICS AND INFORMATION TECHNOLOGY (ICMIT 2017), 2017, :380-383
[34]   Management System Discussion of Electronic Commerce Security [J].
Yan, Yaojun ;
Li, Shuning .
FUTURE INFORMATION TECHNOLOGY, 2011, 13 :571-575
[35]   A Study on the Security Issues and Solution of Electronic Commerce [J].
Dong, Yahui ;
Li, Wei ;
Guo, Xuwen .
ADVANCED RESEARCH ON INFORMATION SCIENCE, AUTOMATION AND MATERIAL SYSTEM, PTS 1-6, 2011, 219-220 :1301-1304
[36]   Management System Discussion of Electronic Commerce Security [J].
Yan, Yaojun ;
Li, Shuning .
2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, :681-684
[37]   On automatic verification of self-stabilizing population protocols [J].
Pang J. ;
Luo Z. ;
Deng Y. .
Frontiers of Computer Science in China, 2008, 2 (4) :357-367
[38]   A Framework for Formal Verification of Security Protocols in C plus [J].
Pradeep, R. ;
Sunitha, N. R. ;
Ravi, V ;
Verma, Sushma .
INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 :163-175
[39]   The Analysis on Electronic Business Online Payment Security Technologies [J].
Chen, Qing ;
Wan, Fang .
2018 4TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE AND MANAGEMENT (ICSSM 2018), 2018,
[40]   Accountability Analysis of Electronic Commerce Protocols by Finite Automaton Model [J].
Xie Xiao-yao 1 ;
2. Institute of Network Technology .
Wuhan University Journal of Natural Sciences, 2004, (03) :293-295