A symbolic framework for multi-faceted security protocol analysis

被引:0
作者
Andrea Bracciali
Gianluigi Ferrari
Emilio Tuosto
机构
[1] University of Pisa,Dipartimento di Informatica
[2] University of Leicester,Computer Science Department
来源
International Journal of Information Security | 2008年 / 7卷
关键词
Formal verification; Security protocols; Symbolic model checking; Automated verification tools;
D O I
暂无
中图分类号
学科分类号
摘要
Verification of software systems, and security protocol analysis as a particular case, requires frameworks that are expressive, so as to properly capture the relevant aspects of the system and its properties, formal, so as to be provably correct, and with a computational counterpart, so as to support the (semi-) automated certification of properties. Additionally, security protocols also present hidden assumptions about the context, specific subtleties due to the nature of the problem and sources of complexity that tend to make verification incomplete. We introduce a verification framework that is expressive enough to capture a few relevant aspects of the problem, like symmetric and asymmetric cryptography and multi-session analysis, and to make assumptions explicit, e.g., the hypotheses about the initial sharing of secret keys among honest (and malicious) participants. It features a clear separation between the modeling of the protocol functioning and the properties it is expected to enforce, the former in terms of a calculus, the latter in terms of a logic. This framework is grounded on a formal theory that allows us to prove the correctness of the verification carried out within the fully fledged model. It overcomes incompleteness by performing the analysis at a symbolic level of abstraction, which, moreover, transforms into executable verification tools.
引用
收藏
页码:55 / 84
页数:29
相关论文
共 44 条
  • [1] Abadi M.(1999)A calculus for cryptographic protocols: the Spi calculus Inform. Comput. 148 1-70
  • [2] Gordon A.(2003)On the symbolic reduction of processes with cryptographic functions Theor. Comput. Sci. 290 695-740
  • [3] Amadio R.(2001)Static analysis for the π-calculus with applications to security Inform. Comput. 168 68-92
  • [4] Lugiez D.(2005)A method for symbolic analysis of security protocols Theor. Comput. Sci. 338 393-425
  • [5] Vanackère V.(1996)A Symbolic Semantics for the π-calculus Inform. Comput. 126 34-52
  • [6] Bodei C.(1990)A logic of authentication ACM Trans. Comput. Syst. 8 18-36
  • [7] Degano P.(1994)Model checking and abstraction ACM Trans. Programm. Languages Syst. 16 1512-1542
  • [8] Nielson F.(1983)On the security of public key protocols IEEE Trans. Inform. Theory. 29 198-208
  • [9] Nielson H.(1999)Strand spaces: Proving security protocols correct J. Comput. Secur. 7 181-230
  • [10] Boreale M.(1997)The Compositional Security Checker: A tool for the verification of information flow security properties IEEE Comput. Soc. 23 550-571