An executable specification language for planning attacks to security protocols

被引:4
作者
Aiello, LC [1 ]
Massacci, F [1 ]
机构
[1] Univ Roma La Sapienza, Dipartimento Informat & Sistemist, I-00198 Rome, Italy
来源
13TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS | 2000年
关键词
security protocols; verification; specification language; planning; logic programs; model checking;
D O I
10.1109/CSFW.2000.856928
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We propose AL(SP) a Declarative Executable Specification Language for Planning Attacks to Security Protocols based on logic programming. III AL(SP) we carl give a declarative specification of a protocol with the natural semantics of send and recieve actions. We view a protocol trace as a plan to reach a goal, so that attacks are just plans caching goals that correspond to security violations, which carl be also declaratively specified. Building on results from logic programming and planning, we map the existence of an attack to a protocol into the existence of a model for the protocol specification that satisfies the specification of an attack. AL(SP) specifications are executable, as we can automatically search for attacks via any efficient model generator (such as smodels), that implements the stable model semantics of normal logic programs.; Thus, we come To a specification language which is easy to rise - protocol specifications are expressed at a high level of abstraction, and with an intuitive notation close to their traditional description - still keeping the rigor of a formal specification that, in addition, is executable.
引用
收藏
页码:88 / 102
页数:3
相关论文
共 32 条
  • [1] [Anonymous], LNCS
  • [2] [Anonymous], 1997, MASTERCARD VISA SET
  • [3] [Anonymous], 1991, Artificial intelligence and mathematical theory of computation: papers in honor of John McCarthy, DOI DOI 10.1016/B978-0-12-450010-5.50026-8
  • [4] APT K, 1990, HDB THEORETICAL COMP
  • [5] Aziz A., 1994, IEEE Personal Communications, V1, P25, DOI 10.1109/98.295357
  • [6] Bella G, 1998, LECT NOTES COMPUT SC, V1485, P361, DOI 10.1007/BFb0055875
  • [7] BRACKIN S, 1999, P ASSET 99
  • [8] Logic of authentication
    Burrows, Michael
    Abadi, Martin
    Needham, Roger
    [J]. Operating Systems Review (ACM), 1989, 23 (05): : 1 - 13
  • [9] CASPER GL, 1998, J COMP SEC, V6, P53
  • [10] CLARKE E, 1998, LICS WORKSH FORM MET