On the correctness of an intrusion-tolerant group communication protocol

被引:0
|
作者
Layouni, M [1 ]
Hooman, J
Tahar, S
机构
[1] Concordia Univ, Dept Elect & Comp Engn, Montreal, PQ H3G 1M8, Canada
[2] Univ Nijmegen, Dept Comp Sci, Nijmegen, Netherlands
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion-tolerance is the technique of using fault-tolerance to achieve security properties. Assuming that faults, both benign and Byzantine, are unavoidable, the main goal of Intrusion-tolerance is to preserve an acceptable, though possibly degraded, service of the overall system despite intrusions at some of its sub-parts. In this paper, we present a correctness proof of the Intrusion-tolerant Enclaves protocol [1] via an adaptive combination of techniques, namely model checking, theorem proving and analytical mathematics. We use Murphi to verify authentication, then PVS to formally specify and prove proper Byzantine Agreement, Agreement Termination and Integrity, and finally we mathematically prove robustness of the group key management module.
引用
收藏
页码:231 / 246
页数:16
相关论文
共 50 条
  • [1] Formal specification and verification of a group membership protocol for an intrusion-tolerant group communication system
    Ramasamy, HV
    Cukier, M
    Sanders, WH
    [J]. 2002 PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2002, : 9 - 18
  • [2] Formal verification of an intrusion-tolerant group membership protocol
    Ramasamy, HV
    Cukier, M
    Sanders, WH
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2003, E86D (12): : 2612 - 2622
  • [3] Experiences with building an intrusion-tolerant group communication system
    Ramasamy, HariGovind V.
    Pandey, Prashant
    Cukier, Michel
    Sanders, William H.
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2008, 38 (06): : 639 - 666
  • [4] Intrusion-tolerant group management in enclaves
    Dutertre, B
    Saïdi, H
    Stavridou, V
    [J]. INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2001, : 203 - 212
  • [5] Worm-IT -: A wormhole-based intrusion-tolerant group communication system
    Correia, Miguel
    Neves, Nuno Ferreira
    Lung, Lau Cheuk
    Verissimo, Paulo
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (02) : 178 - 197
  • [6] Intrusion-tolerant enclaves
    Dutertre, B
    Crettaz, V
    Stavridou, V
    [J]. 2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 216 - 224
  • [7] Secure and Intrusion-tolerant Communication in Wireless Mesh Networks
    Guo Yuan-bo
    Hao Yao-hui
    Wang Chao
    [J]. INTERNATIONAL CONFERENCE OF CHINA COMMUNICATION (ICCC2010), 2010, : 694 - +
  • [8] Intrusion-tolerant intrusion detection system
    Yi, MK
    Hwang, CS
    [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2004, 3073 : 476 - 483
  • [9] Intrusion-tolerant group management in enclaves -: (Transcript of discussion)
    Saïdi, H
    [J]. SECURITY PROTOCOLS, 2002, 2467 : 213 - 216
  • [10] Distributed group membership algorithm in intrusion-tolerant system
    Yin, LH
    Fang, BX
    Yu, XZ
    [J]. ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, PROCEEDINGS, 2006, 3842 : 511 - 515