Knowledge structure approach to verification of authentication protocols

被引:0
|
作者
SU Kaile
机构
关键词
formal verification; security protocol; epistemic logic; Kripke semantics; knowledge structure;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The standard Kripke semantics of epistemic logics has been applied successfully to reasoning communication protocols under the assumption that the network is not hostile. This paper introduces a natural semantics of Kripke semantics called knowledge structure and, by this kind of Kripke semantics, analyzes communication protocols over hostile networks, especially on authentication protocols. Compared with BAN-like logics, the method is automatically implementable because it operates on the actual definitions of the protocols, not on some difficult-to-establish justifications of them. What is more, the corresponding tool called SPV (Security Protocol Verifier) has been developed. Another salient point of this approach is that it is justification-oriented instead of falsification-oriented, i.e. finding bugs in protocols.
引用
收藏
页码:513 / 532
页数:20
相关论文
共 50 条
  • [41] An approach for the automatic verification of blockchain protocols: the Tweetchain case study
    Raimondo, Mariapia
    Bernardi, Simona
    Marrone, Stefano
    Merseguer, Jose
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2023, 19 (01) : 17 - 32
  • [42] Verification of uncertain knowledge-based systems: An empirical verification approach
    OLeary, DE
    [J]. MANAGEMENT SCIENCE, 1996, 42 (12) : 1663 - 1675
  • [43] A VERIFICATION APPROACH FOR KNOWLEDGE-BASED SYSTEMS
    RADWAN, AE
    GOUL, M
    OLEARY, TJ
    MOFFITT, KE
    [J]. TRANSPORTATION RESEARCH PART A-POLICY AND PRACTICE, 1989, 23 (04) : 287 - 300
  • [44] Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs for RFID Systems
    Assidi, Hafsa
    Ayebie, Edoukou Berenger
    Souidi, El Mamoun
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2017, 2018, 10779 : 267 - 283
  • [45] Knowledge Based Approach for Mechanically Verifying Security Protocols
    Ma, Xiaoqi
    Cheng, Xiaochun
    McCrindle, Rachel
    [J]. 19TH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE (IJCAI-05), 2005, : 1572 - 1573
  • [46] A bound on attacks on authentication protocols
    Stoller, SD
    [J]. FOUNDATIONS OF INFORMATION TECHNOLOGY IN THE ERA OF NETWORK AND MOBILE COMPUTING, 2002, 96 : 588 - 600
  • [47] Environmental requirements for authentication protocols
    Canetti, R
    Meadows, C
    Syverson, P
    [J]. SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 339 - 355
  • [48] Privacy and authentication protocols for PCS
    Mohan, S
    [J]. IEEE PERSONAL COMMUNICATIONS, 1996, 3 (05): : 34 - 38
  • [49] Lightweight VANET Authentication Protocols
    Piramuthu, Otto B.
    Caesar, Matthew
    [J]. 37TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2022, : 1975 - 1978
  • [50] Verifying authentication protocols with CSP
    Schneider, S
    [J]. 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 3 - 17