Security protocol specification and verification with AnBx

被引:7
|
作者
Bugliesi, Michele [1 ]
Calzavara, Stefano [1 ]
Modersheim, Sebastian [2 ]
Modesti, Paolo [3 ]
机构
[1] Univ Ca Foscari Venezia, Dipartimento Sci Ambientali Informat & Stat, Venice, Italy
[2] Danmarks Tekniske Univ, DTU Compute, Lyngby, Denmark
[3] Newcastle Univ, Sch Comp Sci, Newcastle Upon Tyne, Tyne & Wear, England
关键词
Protocol specification; Protocol verification; Model-checking; e-payment;
D O I
10.1016/j.jisa.2016.05.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Designing distributed protocols is complex and requires actions at very different levels: from the design of an interaction flow supporting the desired application-specific guarantees to the selection of the most appropriate network-level protection mechanisms. To tame this complexity, we propose AnBx, a formal protocol specification language based on the popular Alice & Bob notation. AnBx offers channels as the main abstraction for communication, providing different authenticity and/or confidentiality guarantees for message transmission. AnBx extends existing proposals in the literature with a novel notion of forwarding channels, enforcing specific security guarantees from the message originator to the final recipient along a number of intermediate forwarding agents. We give a formal semantics of AnBx in terms of a state transition system expressed in the AVISPA Intermediate Format. We devise an ideal channel model and a possible cryptographic implementation, and we show that, under mild restrictions, the two representations coincide, thus making AnBx amenable to automated verification with different tools. We demonstrate the benefits of the declarative specification style distinctive of AnBx by revisiting the design of two existing e-payment protocols: iKP and SET. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:46 / 63
页数:18
相关论文
共 50 条
  • [31] Specification, verification and simulation of a wireless lan protocol: MACAW
    Lundy, GM
    Almquist, M
    Oruk, T
    IEEE MILITARY COMMUNICATIONS CONFERENCE - PROCEEDINGS, VOLS 1-3, 1998, : 565 - 569
  • [32] Formal specification and verification of the SET/A protocol with an integrated approach
    Lam, VSW
    Padget, J
    CEC 2004: IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE TECHNOLOGY, PROCEEDINGS, 2004, : 229 - 235
  • [33] Formal hardware specification languages for protocol compliance verification
    Bunker, A
    Gopalakrishnan, G
    Mckee, SA
    ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2004, 9 (01) : 1 - 32
  • [34] Alternative specification and verification of a periodic state exchange protocol
    Olah, AL
    deGroot, SMH
    IEEE-ACM TRANSACTIONS ON NETWORKING, 1997, 5 (04) : 525 - 529
  • [35] SDL specification and verification of connection establishment and release protocol
    Kampirellis, S.
    Triantafyllou, S.
    Andreatos, A.
    Recent Advances in Signal Processing and Communications, 1999, : 299 - 303
  • [36] FORMAL SPECIFICATION AND COMPOSITIONAL VERIFICATION OF AN ATOMIC BROADCAST PROTOCOL
    ZHOU, P
    HOOMAN, J
    REAL-TIME SYSTEMS, 1995, 9 (02) : 119 - 145
  • [37] A generic graphical specification environment for security protocol modelling
    Saul, E
    Hutchison, A
    INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 311 - 320
  • [38] Security Analysis of Trust on the Controller in the Matter Protocol Specification
    Shashwat, Kumar
    Hahn, Francis
    Ou, Xinming
    Singhal, Anoop
    2023 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY, CNS, 2023,
  • [39] Features of a Visualization Tool for Specification and Analysis of Security Protocol
    Mayouf, Mabroka Ali
    Shukur, Zarina
    INTERNATIONAL SYMPOSIUM OF INFORMATION TECHNOLOGY 2008, VOLS 1-4, PROCEEDINGS: COGNITIVE INFORMATICS: BRIDGING NATURAL AND ARTIFICIAL KNOWLEDGE, 2008, : 2278 - 2282
  • [40] Specification, verification, and quantification of security in model-based systems
    Ouchani, Samir
    Debbabi, Mourad
    COMPUTING, 2015, 97 (07) : 691 - 711