ASPIER: An Automated Framework for Verifying Security Protocol Implementations

被引:37
作者
Chaki, Sagar
Datta, Anupam
机构
来源
PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM | 2009年
关键词
security protocol; verification; model checking; abstraction refinement;
D O I
10.1109/CSF.2009.20
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present ASPIER - the first framework that combines software model checking with a standard protocol security model to automatically analyze authentication and secrecy properties of protocol implementations in C. The technical approach extends the iterative abstraction-refinement methodology for software model checking with a domain-specific protocol and symbolic attacker model. We have implemented the ASPIER tool and used it to verify authentication and secrecy properties of a part of an industrial strength protocol implementation - the handshake in OpenSSL - for configurations consisting of up to 3 servers and 3 clients. We have also implemented two distinct methods for reasoning about attacker message derivations, and evaluated them in the context of OpenSSL verification. ASPIER detected the "version-rollback" vulnerability in OpenSSL 0.9.6c source code and successfully verified the implementation when clients and servers are only willing to run SSL 3.0.
引用
收藏
页码:172 / 185
页数:14
相关论文
共 46 条
  • [1] ABADI I, 1999, INFORM COMPUTATION
  • [2] Abadi Martin, 2005, Proceedings of the ACM Conference on Computer and Communications Security (CCS), P340
  • [3] [Anonymous], GEODERMA
  • [4] [Anonymous], 1998, RFC 2401
  • [5] [Anonymous], LNCS
  • [6] [Anonymous], 2001, Model checking
  • [7] [Anonymous], P OSDI
  • [8] [Anonymous], 1997, Proceedings of POPL, DOI [10.1145/263699.263717, DOI 10.1145/263699.263717]
  • [9] BALL T, 2002, MSRTR200209
  • [10] Basin D., 2005, International Journal of Information Security, V4, P181, DOI DOI 10.1007/S10207-004-0055-7