Formal Analysis of SPDM: Security Protocol and Data Model version 1.2

被引:0
|
作者
Cremers, Cas [1 ]
Dax, Alexander [1 ]
Naska, Aurora [1 ]
机构
[1] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
DMTF is a standards organization by major industry players in IT infrastructure including AMD, Alibaba, Broadcom, Cisco, Dell, Google, Huawei, IBM, Intel, Lenovo, and NVIDIA, which aims to enable interoperability, e.g., including cloud, virtualization, network, servers and storage. It is currently standardizing a security protocol called SPDM, which aims to secure communication over the wire and to enable device attestation, notably also explicitly catering for communicating hardware components. The SPDM protocol inherits requirements and design ideas from IETF's TLS 1.3. However, its state machines and transcript handling are substantially different and more complex. While architecture, specification, and open-source libraries of the current versions of SPDM are publicly available, these include no significant security analysis of any kind. In this work we develop the first formal models of the three modes of the SPDM protocol version 1.2.1, and formally analyze their main security properties.
引用
下载
收藏
页码:6611 / 6628
页数:18
相关论文
共 50 条
  • [21] Formal Security Analysis and Improvement Based on LonTalk Authentication Protocol
    Feng, Tao
    Wu, Yi
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [22] Towards formal analysis of wireless LAN security with MIS protocol
    You, Ilsun
    Hori, Yoshiaki
    Sakurai, Kouichi
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2011, 7 (02) : 112 - 120
  • [23] A Study of Process Calculus for Formal Verification and Analysis of Security Protocol
    Irfan, Annie
    Gaur, Manish
    Tripathi, Surya Prakash
    PROCEEDINGS OF THE 2018 4TH INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT - 2018), 2018, : 119 - 124
  • [24] A Formal Model For Multi-Protocol Analysis
    Gu, Wen
    Han, Ji-Hong
    Yuan, Lin
    2017 IEEE 2ND ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2017, : 2559 - 2562
  • [25] Formal Reasoning for Security Protocol Correctness
    Adi, Kamel
    Pene, Liviu
    NEW TRENDS IN SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 2008, 182 : 63 - +
  • [26] Formal Security Assessment of Modbus Protocol
    Nardone, Roberto
    Rodriguez, Ricardo J.
    Marrone, Stefano
    2016 11TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2016, : 142 - 147
  • [27] Research on formal security policy model specification and its formal analysis
    Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
    不详
    不详
    Tongxin Xuebao, 2006, 6 (94-101):
  • [28] An abstract model for security protocol analysis
    Bela, Genge
    Ignat, Iosif
    WSEAS Transactions on Computers, 2007, 6 (02): : 207 - 214
  • [29] A Novel Formal Theory for Security Protocol Analysis of Denial of Service Based on Extended Strand Space Model
    Jiang Rui
    CHINA COMMUNICATIONS, 2010, 7 (04) : 23 - 28
  • [30] Formal Security Analysis and Performance Evaluation of the Linkable Anonymous Access Protocol
    Addas, Rima
    Zhang, Ning
    INFORMATION AND COMMUNICATION TECHNOLOGY, 2014, 8407 : 500 - 510