Soundness conditions for message encoding abstractions in formal security protocol models

被引:1
|
作者
Pironti, Alfredo [1 ]
Sisto, Riccardo [1 ]
机构
[1] Politecn Torino, Dip Automat & Informat, I-10129 Turin, Italy
关键词
D O I
10.1109/ARES.2008.30
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Informal methods, security protocols are usually modeled with a high level of abstraction. In particular, marshalling/unmarshalling operations on transmitted messages are generally abstracted away. However in real applications, errors in this protocol component could be exploited to break protocol security. In order to solve this issue, this paper formally shows that, under some constraints checkable on sequential code, if an abstract protocol model is secure, then a refined model, which takes into account a wide class of possible implementations of the marshalling/unmarshalling operations, is implied to be secure too. The paper also indicates possible exploitations of this result.
引用
收藏
页码:72 / 79
页数:8
相关论文
共 50 条
  • [1] Soundness conditions for cryptographic algorithms and parameters abstractions in formal security protocol models
    Pironti, Alfredo
    Sisto, Riccardo
    DEPCOS - RELCOMEX 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, 2008, : 31 - 38
  • [2] Safe abstractions of data encodings in formal security protocol models
    Pironti, Alfredo
    Sisto, Riccardo
    FORMAL ASPECTS OF COMPUTING, 2014, 26 (01) : 125 - 167
  • [3] Abstractions for security protocol verification
    Binh Thanh Nguyen
    Sprenger, Christoph
    Cremers, Cas
    JOURNAL OF COMPUTER SECURITY, 2018, 26 (04) : 459 - 508
  • [4] Abstractions for security protocol verification
    Nguyen, Binh Thanh
    Sprenger, Christoph
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2015, 9036 : 196 - 215
  • [5] Composable formal security analysis: Juggling soundness, simplicity and efficiency
    Canetti, Ran
    AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, PROCEEDINGS, 2008, 5126 : 1 - +
  • [6] Security Abstractions and Intruder Models (Extended Abstract)
    Bugliesi, Michele
    Focardi, Riccardo
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 242 (01) : 99 - 112
  • [7] A Novel Authentication Protocol with Soundness and High Efficiency for Security Problems
    Li Xuefeng
    Bai Enjian
    Xie Yinghua
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4560 - 4562
  • [8] How to prove security of communication protocols? A discussion on the soundness of formal models w.r.t. computational ones
    Comon-Lundh, Hubert
    Cortier, Veronique
    28TH INTERNATIONAL SYMPOSIUM ON THEORETICAL ASPECTS OF COMPUTER SCIENCE (STACS 2011), 2011, 9 : 29 - 44
  • [9] Formal Reasoning for Security Protocol Correctness
    Adi, Kamel
    Pene, Liviu
    NEW TRENDS IN SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 2008, 182 : 63 - +
  • [10] Formal Security Assessment of Modbus Protocol
    Nardone, Roberto
    Rodriguez, Ricardo J.
    Marrone, Stefano
    2016 11TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2016, : 142 - 147