Automated Verification Of Cryptographic Protocol Implementations

被引:0
|
作者
Babenko, Liudmila [1 ]
Pisarev, Ilya [1 ]
机构
[1] Southern Fed Univ, Informat Technol Secur Dept, Taganrog, Russia
关键词
verification; parser; translator; dynamic analysis; formal verification; cryptographic protocols; model;
D O I
10.1109/DeSE.2019.00157
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
When implementing systems using a secure data connection between components, it is important to analyze the security of data transmission. Secure data transfer is achieved by using cryptographic protocols. It is important to verify the security of cryptographic protocols already implemented in the system, since this is the last iteration of their compilation in the form of their implementation in the selected progranuning language. The paper proposes a scheme and approaches for creating an automated security verifier of cryptographic protocol implementations. The problems that arise when implementing cryptographic protocols in progranuning languages are described. A verification scheme based on the use of a source code analyzer for extracting the structure of cryptographic protocols, translating their structure of the Alice-Bob format protocol into the specification language for formal verifiers, and dynamic analysis of the implementation code is presented. The approaches for the implementation of the analyzer, translator and dynamic analyser are described, as well as the future work.
引用
收藏
页码:849 / 854
页数:6
相关论文
共 50 条
  • [21] Formal verification of security protocol implementations: a survey
    Avalle, Matteo
    Pironti, Alfredo
    Sisto, Riccardo
    FORMAL ASPECTS OF COMPUTING, 2014, 26 (01) : 99 - 123
  • [22] Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR
    Dreier, Jannik
    Hirschi, Lucca
    Radomirovic, Sasa
    Sasse, Ralf
    IEEE 31ST COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2018), 2018, : 359 - 373
  • [23] CAOVerif: An open-source deductive verification platform for cryptographic software implementations
    Almeida, Jose Bacelar
    Barbosa, Manuel
    Filliatre, Jean-Christophe
    Pinto, Jorge Sousa
    Vieira, Barbara
    SCIENCE OF COMPUTER PROGRAMMING, 2014, 91 : 216 - 233
  • [24] A method for automatic cryptographic protocol verification (extended abstract)
    Goubault-Larrecq, J
    PARALLEL AND DISTRIBUTED PROCESSING, PROCEEDINGS, 2000, 1800 : 977 - 984
  • [25] USING DEDUCTIVE KNOWLEDGE TO IMPROVE CRYPTOGRAPHIC PROTOCOL VERIFICATION
    Li, Zhiwei
    Wang, Weichao
    MILCOM 2009 - 2009 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-4, 2009, : 635 - 641
  • [26] Modeling for security verification of a cryptographic protocol with MAC payload
    Wang, HB
    Zhang, YS
    Li, Y
    ADVANCES IN INTELLIGENT COMPUTING, PT 2, PROCEEDINGS, 2005, 3645 : 538 - 547
  • [27] Formal Verification of Cryptographic Protocol for Secure RFID System
    Kim, Hyun-Seok
    Oh, Jung-Hyun
    Kim, Ju-Bae
    Jeong, Yeon-Oh
    Choi, Jin-Young
    NCM 2008: 4TH INTERNATIONAL CONFERENCE ON NETWORKED COMPUTING AND ADVANCED INFORMATION MANAGEMENT, VOL 2, PROCEEDINGS, 2008, : 470 - 477
  • [28] ALGORITHMS FOR AUTOMATED PROTOCOL VERIFICATION
    HOLZMANN, GJ
    AT&T TECHNICAL JOURNAL, 1990, 69 (01): : 32 - 44
  • [29] A Generic Methodology for the Modular Verification of Security Protocol Implementations
    Arquint, Linard
    Schwerhoff, Malte
    Mehta, Vaibhav
    Mueller, Peter
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1377 - 1391
  • [30] CIPHERH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations
    Deng, Sen
    Li, Mengyuan
    Tang, Yining
    Wang, Shuai
    Yan, Shoumeng
    Zhang, Yinqian
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 6843 - 6860