Automatic verification of security in payment protocols for electronic commerce

被引:0
作者
Panti, M [1 ]
Spalazzi, L [1 ]
Tacconi, S [1 ]
Valenti, S [1 ]
机构
[1] Univ Ancona, Ist Informat, Ancona, Italy
来源
ENTERPRISE INFORMATION SYSTEMS IV | 2002年
关键词
payment protocols; electronic commerce; security requirements; model checking; automatic verification; protocol attacks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to make secure transactions over computer networks, various cryptographic protocols have been proposed but, because of subtleties involved in their design, many of them have been shown to have flaws, even a long time after their publication. For this reason, several automatic verification methods for analyzing these protocols have been devised. The aim of this paper is to present a methodology for verifying security requirements of electronic payment protocols by means of NuSMV, a symbolic model checker. Our work principally focus on formal representation of security requirements. Indeed, we propose an extension of the correspondence property, so far used only for authentication, to other requirements as confidentiality and integrity. These are the basic security requirements of payment protocols for electronic commerce. We illustrate as case study a variant of the SET protocol proposed by Lu & Smolka. This variant has been formally verified by Ly & Smolka and considered secure. Conversely, we have discovered two attacks that allow a dishonest user to purchase a good debiting the amount to another user.
引用
收藏
页码:276 / 282
页数:7
相关论文
共 50 条
[41]   Handling algebraic properties in automatic analysis of security protocols [J].
Boichut, Y. ;
Heam, P. -C. ;
Kouchnarenko, O. .
THEORETICAL ASPECTS OF COMPUTING - ICTAC 2006, 2006, 4281 :153-167
[42]   Research on Security Strategy of Electronic Commerce Industry Websites [J].
Gong, Songjie ;
Wang, Ya .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS, 2015, 15 :361-365
[43]   Design of the XML Security System for Electronic Commerce Application [J].
安南 .
High Technology Letters, 2003, (02) :81-86
[44]   Holistic security management framework applied in electronic commerce [J].
Zuccato, Albin .
COMPUTERS & SECURITY, 2007, 26 (03) :256-265
[45]   An approach to the formal verification of the three-principal security protocols [J].
Zhang, YQ ;
Liu, XY ;
Feng, DG .
SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, :163-169
[46]   Research on application of dynamic security model in electronic commerce [J].
Tong, Xiaojun ;
Cui, Minggen ;
Wang, Jie .
DCABES 2007 PROCEEDINGS, VOLS I AND II, 2007, :499-503
[47]   MODELS AND METHODS OF SECURITY PROVISION IN ELECTRONIC COMMERCE SYSTEMS [J].
Novozhilova, M., V ;
Lieushina, N. A. .
FINANCIAL AND CREDIT ACTIVITY-PROBLEMS OF THEORY AND PRACTICE, 2008, 2 (05) :71-76
[48]   Research on Information Security of Electronic Commerce Logistics System [J].
Lv, Guoning ;
Gao, Min ;
Ji, Xiaoyu .
INTELLIGENT COMPUTING THEORIES AND APPLICATION, ICIC 2016, PT I, 2016, 9771 :600-611
[49]   Research on the Security of Electronic Commerce Based on Computer Network [J].
Jiang Xuehui .
2013 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND ENGINEERING APPLICATIONS, 2013, :541-545
[50]   Security Analysis of an Electronic Commerce Protocol Using Casper/FDR2 [J].
CHANG YinlongHU Huaping Department of Mathematics and Computer ScienceKey Laboratory of Information Security of Network SystemFuzhou UniversityFuzhou FujianChinaSchool of Computer ScienceNational University of Defense TechnologyChangsha HunanChina .
WuhanUniversityJournalofNaturalSciences, 2012, 17 (06) :499-503