Towards an automatic analysis of web service security

被引:0
|
作者
Chevalier, Yannick [1 ]
Lugiez, Denis [2 ]
Rusinowitch, Michael [3 ]
机构
[1] Univ Toulouse, Team LiLac, IRIT, Toulouse, France
[2] Aix Marseille Univ, CNRS, LIF, F-13284 Marseille, France
[3] LORIA INRIA Lorraine, Lorraine, France
关键词
security; web services; verification; cryptographic protocols; combination of decision procedures; equational theories; rewriting;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Web services send and receive messages in XML syntax with some parts hashed, encrypted or signed, according to the WS-Security standard. In this paper we introduce a model to formally describe the protocols that underly these services, their security properties and the rewriting attacks they might be subject to. Unlike other protocol models (in symbolic analysis) ours can handle non-deterministic receive/send actions and unordered sequence of XML nodes. Then to detect the attacks we have to consider the services as combining multiset operators and cryptographic ones and we have to solve specific satisfiability problems in the combined theory. By non-trivial extension of the combination techniques of [3] we obtain a decision procedure for insecurity of Web services with messages built using encryption, signature, and other cryptographic primitives. This combination technique allows one to decide insecurity in a modular way by reducing the associated constraint solving problems to problems in simpler theories.
引用
收藏
页码:133 / +
页数:3
相关论文
共 50 条
  • [21] Web service composition: A security perspective
    Carminati, B
    Ferrari, E
    Hung, PCK
    [J]. International Workshop on Challenges in Web Information Retrieval and Integration, Proceedings, 2005, : 248 - 253
  • [22] Semantic Security Policy for Web Service
    He Zheng-qiu
    Wu Li-fa
    Hong Zheng
    Lai Hai-guang
    [J]. 2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, PROCEEDINGS, 2009, : 258 - 262
  • [23] Security Threats and Risk Analysis of an Iot Web Service for a Smart Vineyard
    Borrelli, Massimo
    Coric, Vanes
    Gnauer, Clemens
    Wolfgeher, Jennifer
    Tauber, Markus
    [J]. ERCIM NEWS, 2018, (113): : 42 - 43
  • [24] Automatic Web service composition based on graph network analysis metrics
    Gekas, J
    Fasli, M
    [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2005: COOPIS, DOA, AND ODBASE, PT 2, PROCEEDINGS, 2005, 3761 : 1571 - 1587
  • [25] Towards a Process for Web Services Security
    Gutiérrez, C
    Fernández-Medina, E
    Piattini, M
    [J]. JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY, 2006, 38 (01): : 57 - 67
  • [26] Towards a Formal Foundation of Web Security
    Akhawe, Devdatta
    Barth, Adam
    Lam, Peifung E.
    Mitchell, John
    Song, Dawn
    [J]. 2010 23RD IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2010, : 290 - 304
  • [27] Towards Web security using PLASMA
    Krannig, A
    [J]. PROCEEDINGS OF THE SEVENTH USENIX SECURITY SYMPOSIUM, 1998, : 173 - 186
  • [28] Automatic Defensive Security System for WEB Information
    Huo, Jiuyuan
    Qu, Hong
    [J]. ADVANCED INFORMATION TECHNOLOGY IN EDUCATION, 2012, 126 : 83 - 88
  • [29] Towards Security Assurance Metrics for Service Systems Security
    Ouedraogo, Moussa
    [J]. EXPLORING SERVICES SCIENCE, 2012, 103 : 361 - 370
  • [30] Idea: Automatic Security Testing for Web Applications
    Dao, Thanh-Binh
    Shibayama, Etsuya
    [J]. ENGINEERING SECURE SOFTWARE AND SYSTEMS, PROCEEDINGS, 2009, 5429 : 180 - +