Deciding Recognizability under Dolev-Yao Intruder Model

被引:0
|
作者
Li, Zhiwei [1 ]
Wang, Weichao [1 ]
机构
[1] UNC Charlotte, Dept SIS, Charlotte, NC 28262 USA
来源
INFORMATION SECURITY | 2011年 / 6531卷
关键词
Security; Verification; Formal Methods; SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The importance of reasoning about recognizability has recently been stressed in finding type flaw attacks, in which a protocol message may be forged from another message. However, the problem of deciding recognizability has never been fully exploited. To fill this gap, we present a terminating procedure to decide recognizability under the standard Dolev-Yao model. By incorporating the proposed procedure with Athena, a well-know security protocol verifier, our experiments succeed in finding potential type flaw attacks.
引用
收藏
页码:416 / 429
页数:14
相关论文
共 32 条
  • [1] Extending the Dolev-Yao intruder for analyzing an unbounded number of sessions
    Chevalier, Y
    Küsters, R
    Rusinowitch, M
    Turuani, M
    Vigneron, L
    [J]. COMPUTER SCIENCE LOGIC, PROCEEDINGS, 2003, 2803 : 128 - 141
  • [2] Justifying a Dolev-Yao model under active attacks
    Backes, M
    Pfitzmann, B
    Waidner, M
    [J]. FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 1 - 41
  • [3] A Dolev-Yao Model for Zero Knowledge
    Baskar, Anguraj
    Ramanujam, R.
    Suresh, S. P.
    [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2009: INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5913 : 137 - +
  • [4] An extension of typed MSR for specifying esoteric protocols and their Dolev-Yao intruder
    Balopoulos, T
    Gritzalis, S
    Katsikas, SK
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2005, 175 : 209 - 221
  • [5] Extending Dolev-Yao with Assertions
    Ramanujam, R.
    Sundararajan, Vaishnavi
    Suresh, S. P.
    [J]. INFORMATION SYSTEMS SECURITY (ICISS 2014), 2014, 8880 : 50 - 68
  • [6] Satisfiability of Dolev-Yao Constraints
    Mazare, Laurent
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 125 (01) : 109 - 124
  • [7] A structured operational modelling of the Dolev-Yao threat model
    Mao, WB
    [J]. SECURITY PROTOCOLS, 2004, 2845 : 34 - 44
  • [8] A computational interpretation of Dolev-Yao adversaries
    Herzog, J
    [J]. THEORETICAL COMPUTER SCIENCE, 2005, 340 (01) : 57 - 81
  • [9] Decision and Complexity of Dolev-Yao Hyperproperties
    Rakotonirina, Itsaka
    Barthe, Gilles
    Schneidewind, Clara
    [J]. PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2024, 8 (POPL):
  • [10] A Game Of Drones: Extending the Dolev-Yao Attacker Model With Movement
    Cook, Andrew
    Vigano, Luca
    [J]. 2020 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2020), 2020, : 280 - 292