Soft constraint programming to analysing security protocols

被引:11
|
作者
Bella, G
Bistarelli, S
机构
[1] Univ Catania, Dipartimento Matemat & Informat, I-95125 Catania, Italy
[2] CNR, Ist Informat & Telemat, I-56124 Pisa, Italy
[3] Univ G DAnnunzio, Dipartimento Sci, I-65127 Pescara, Italy
关键词
security; constraints; security protocols; soft constraints;
D O I
10.1017/S1471068404002121
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security protocols stipulate how the remote principals of a computer network should interact in order to obtain specific security goals. The crucial goals of confidentiality and authentication may be achieved in various forms, each of different strength. Using soft (rather than crisp) constraints, we develop a uniform formal notion for the two goals. They are no longer formalised as mere yes/no properties as in the existing literature, but gain an extra parameter, the security level. For example, different messages can enjoy different levels of confidentiality, or a principal can achieve different levels of authentication with different principals. The goals are formalised within a general framework for protocol analysis that is amenable to mechanisation by model checking. Following the application of the framework to analysing the asymmetric Needham-Schroeder protocol (Bella and Bistarelli 2001; Bella and Bistarelli 2002), we have recently discovered a new attack on that protocol as a form of retaliation by principals who have been attacked previously. Having commented on that attack, we then demonstrate the framework on a bigger, largely deployed protocol consisting of three phases, Kerberos.
引用
收藏
页码:545 / 572
页数:28
相关论文
共 50 条
  • [1] Soft concurrent constraint programming
    Bistarelli, Stefano
    Montanari, Ugo
    Rossi, Francesca
    ACM TRANSACTIONS ON COMPUTATIONAL LOGIC, 2006, 7 (03) : 563 - 589
  • [2] Local Spaces in Soft Concurrent Constraint Programming Oriented to Security
    Bistarelli, Stefano
    Santini, Francesco
    LEVERAGING APPLICATIONS OF FORMAL METHODS, VERIFICATION AND VALIDATION: REOCAS COLLOQUIUM IN HONOR OF ROCCO DE NICOLA, PT I, ISOLA 2024, 2025, 15219 : 373 - 391
  • [3] Analysing Security Protocols Using Scenario Based Simulation
    Al-Shareefi, Farah
    Lisitsa, Alexei
    Dixon, Clare
    VERIFICATION AND EVALUATION OF COMPUTER AND COMMUNICATION SYSTEMS, VECOS 2019, 2019, 11847 : 47 - 62
  • [4] Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
    Modersheim, Sebastian
    Vigano, Luca
    Basin, David
    JOURNAL OF COMPUTER SECURITY, 2010, 18 (04) : 575 - 618
  • [5] Analysing Security Protocols Using Refinement in iUML-B
    Snook, Colin
    Hoang, Thai Son
    Butler, Michael
    NASA FORMAL METHODS (NFM 2017), 2017, 10227 : 84 - 98
  • [6] Unicast and Multicast QoS Routing with Soft-Constraint Logic Programming
    Bistarelli, Stefano
    Montanari, Ugo
    Rossi, Francesca
    Santini, Francesco
    ACM TRANSACTIONS ON COMPUTATIONAL LOGIC, 2010, 12 (01)
  • [7] A Proof Theoretic Study of Soft Concurrent Constraint Programming
    Pimentel, Elaine
    Olarte, Carlos
    Nigam, Vivek
    THEORY AND PRACTICE OF LOGIC PROGRAMMING, 2014, 14 : 649 - 663
  • [8] Soft constraint logic programming and generalized shortest path problems
    Bistarelli, S
    Montanari, U
    Rossi, F
    JOURNAL OF HEURISTICS, 2002, 8 (01) : 25 - 41
  • [9] Soft Constraint Logic Programming and Generalized Shortest Path Problems
    Stefano Bistarelli
    Ugo Montanari
    Francesca Rossi
    Journal of Heuristics, 2002, 8 : 25 - 41
  • [10] Automated Selection of Security Protocols in SINET
    Wang, Xiaojie
    Dong, Ping
    Song, Fei
    PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING (ICMMCCE 2017), 2017, 141 : 1543 - 1546