On-the-Fly Trace Generation and Textual Trace Analysis and Their Applications to the Analysis of Cryptographic Protocols

被引:0
|
作者
Permpoontanalarp, Yongyuth [1 ]
机构
[1] King Mongkuts Univ Technol Thonburi, Fac Engn, Dept Comp Engn, Log & Secur Lab, Bangkok, Thailand
关键词
Formal methods for cryptographic protocols; Model checking; Cryptographic protocols; SECURITY; BREAKING;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many model checking methods have been developed and applied to analyze cryptographic protocols. Most of them can analyze only one attack trace of a found attack. In this paper, we propose a very simple but practical model checking methodology for the analysis of cryptographic protocols. Our methodology offers an efficient analysis of all attack traces for each found attack, and is independent to model checking tools. It contains two novel techniques which are on-the-fly trace generation and textual trace analysis. In addition, we apply our method to two case studies which are TMN authenticated key exchanged protocol and Micali's contract signing protocol. Surprisingly, it turns out that our simple method is very efficient when the numbers of traces and states are large. Also, we found many new attacks in those protocols.
引用
收藏
页码:201 / 215
页数:15
相关论文
共 50 条
  • [1] On-the-fly Trace Generation Approach to the Security Analysis of Cryptographic Protocols: Coloured Petri Nets-based Method
    Permpoontanalarp, Yongyuth
    Sornkhom, Panupong
    [J]. FUNDAMENTA INFORMATICAE, 2014, 130 (04) : 423 - 466
  • [2] Symbolic trace analysis of cryptographic protocols
    Boreale, M
    [J]. AUTOMATA LANGUAGES AND PROGRAMMING, PROCEEDING, 2001, 2076 : 667 - 681
  • [3] Formal Analysis for Cryptographic Protocols on a Trace Semantics
    Jiang, Yun
    Gong, HuaPing
    [J]. INTERNATIONAL CONFERENCE ON FUTURE NETWORKS, PROCEEDINGS, 2009, : 127 - 129
  • [4] On-the-fly resolve trace minimization
    Shacham, Ohad
    Yorav, Karen
    [J]. 2007 44TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2, 2007, : 594 - +
  • [5] Retailoring for Fast, On-the-Fly Trace Generation for NoC Design Space Exploitation
    Chang, Yu-Chi
    Huang, Yoshi Shih-Chieh
    Tsai, Tsung-Chan
    Chang, Yuan-Ying
    King, Chung-Ta
    Lu, Juin-Ming
    [J]. 2014 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C 2014), 2014, : 1030 - 1033
  • [6] ON-THE-FLY AUTOMATIC GENERATION OF SECURITY PROTOCOLS
    Kiyomoto, Shinsaku
    Ota, Haruki
    Tanaka, Toshiaki
    [J]. ICEIS 2008: PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL ISAS-2: INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION, VOL 2, 2008, : 97 - 104
  • [7] Attack trace generation of cryptographic protocols based on coloured Petri nets model
    Bai, Yunli
    Ye, Xinming
    [J]. International Journal of Wireless and Mobile Computing, 2013, 6 (01) : 91 - 97
  • [8] On-the-Fly Trace Generation Approach to the Security Analysis of the TMN Protocol with Homomorphic Property: A Petri Nets-Based Method
    Permpoontanalarp, Yongyuth
    Changkhanak, Apichai
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (01): : 215 - 229
  • [9] TRACE OF A TRACE OF A TRACE (ANALYSIS)
    MURRAY, RW
    [J]. ANALYTICAL CHEMISTRY, 1991, 63 (19) : A921 - A921
  • [10] Provable security for cryptographic protocols - Exact analysis and engineering applications
    Gray, JW
    Ip, KFE
    Lui, KS
    [J]. 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 45 - 58