Automated Verification of Timed Security Protocols with Clock Drift

被引:2
|
作者
Li, Li [1 ]
Sun, Jun [1 ]
Dong, Jin Song [2 ]
机构
[1] Singapore Univ Technol & Design, Singapore, Singapore
[2] Natl Univ Singapore, Singapore, Singapore
来源
FM 2016: FORMAL METHODS | 2016年 / 9995卷
关键词
AUTHENTICATION;
D O I
10.1007/978-3-319-48989-6_31
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Time is frequently used in security protocols to provide better security. For instance, critical credentials often have limited lifetime which improves the security against brute-force attacks. However, it is challenging to correctly use time in protocol design, due to the existence of clock drift in practice. In this work, we develop a systematic method to formally specify as well as automatically verify timed security protocols with clock drift. We first extend the previously proposed timed applied pi-calculus as a formal specification language for timed protocols with clock drift. Then, we define its formal semantics based on timed logic rules, which facilitates efficient verification against various security properties. Clock drift is encoded as parameters in the rules. The verification result shows the constraints associated with clock drift that are required for the security of the protocol, e.g., the maximum drift should be less than some constant. We evaluate our method with multiple timed security protocols. We find a time-related security threat in the TESLA protocol, a complex time-related broadcast protocol for lossy channels, when the clocks used by different protocol participants do not share the same clock rate.
引用
收藏
页码:513 / 530
页数:18
相关论文
共 50 条
  • [1] Automated Verification of Accountability in Security Protocols
    Kuennemann, Robert
    Esiyok, Ilkan
    Backes, Michael
    [J]. 2019 IEEE 32ND COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2019), 2019, : 397 - 413
  • [2] Challenges in the automated verification of security protocols
    Comon-Lundh, Hubert
    [J]. AUTOMATED REASONING, PROCEEDINGS, 2008, 5195 : 396 - 409
  • [3] A Formal Specification and Verification Framework for Timed Security Protocols
    Li, Li
    Sun, Jun
    Liu, Yang
    Sun, Meng
    Dong, Jin-Song
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2018, 44 (08) : 725 - 746
  • [4] Towards the Automated Verification of Cyber-Physical Security Protocols: Bounding the Number of Timed Intruders
    Nigam, Vivek
    Talcott, Carolyn
    Urquiza, Abraao Aires
    [J]. COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 : 450 - 470
  • [5] On Backward-Style Verification for Timed Anonymity of Security Protocols
    Kawabe, Yoshinobu
    Ito, Nobuhiro
    [J]. 2016 IEEE 5TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS, 2016,
  • [6] Using Backward Induction Techniques in (Timed) Security Protocols Verification
    Kurkowski, Miroslaw
    Siedlecka-Lamch, Olga
    Dudek, Pawel
    [J]. COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2013, 2013, 8104 : 265 - 276
  • [7] Automated verification of selected equivalences for security protocols
    Blanchet, B
    Abadi, M
    Fournet, C
    [J]. LICS 2005: 20TH ANNUAL IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE - PROCEEDINGS, 2005, : 331 - 340
  • [8] Automated verification of selected equivalences for security protocols
    Blanchet, Bruno
    Abadi, Martin
    Fournet, Cedric
    [J]. JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2008, 75 (01): : 3 - 51
  • [9] Timed Interpreted Systems as a New Agent-Based Formalism for Verification of Timed Security Protocols
    Zbrzezny, Agnieszka M.
    Siedlecka-Lamch, Olga
    Szymoniak, Sabina
    Zbrzezny, Andrzej
    Kurkowski, Miroslaw
    [J]. Applied Sciences (Switzerland), 2024, 14 (22):
  • [10] Timed Analysis of Security Protocols
    Szymoniak, Sabina
    Siedlecka-Lamch, Olga
    Kurkowski, Miroslaw
    [J]. INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY - ISAT 2016 - PT II, 2017, 522 : 53 - 63