Mechanized Network Origin and Path Authenticity Proofs

被引:16
|
作者
Zhang, Fuyuan [1 ]
Jia, Limin [2 ]
Basescu, Cristina [3 ]
Kim, Tiffany Hyun-Jin [1 ]
Hu, Yih-Chun [4 ]
Perrig, Adrian [1 ,3 ]
机构
[1] CMU, CyLab, Pittsburgh, PA 15213 USA
[2] CMU, ECE & INI, Pittsburgh, PA USA
[3] Swiss Fed Inst Technol, Zurich, Switzerland
[4] UIUC, Gelibolu, Turkey
基金
欧洲研究理事会; 美国安德鲁·梅隆基金会;
关键词
Origin authenticity; path authenticity; secrecy; formal methods; mechanized proofs; SECURITY;
D O I
10.1145/2660267.2660349
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A secure routing infrastructure is vital for secure and reliable Internet services. Source authentication and path validation are two fundamental primitives for building a more secure and reliable Internet. Although several protocols have been proposed to implement these primitives, they have not been formally analyzed for their security guarantees. In this paper, we apply proof techniques for verifying cryptographic protocols (e.g., key exchange protocols) to analyzing network protocols. We encode LS2, a program logic for reasoning about programs that execute in an adversarial environment, in Coq. We also encode protocol-specific data structures, predicates, and axioms. To analyze a source-routing protocol that uses chained MACs to provide origin and path validation, we construct Coq proofs to show that the protocol satisfies its desired properties. To the best of our knowledge, we are the first to formalize origin and path authenticity properties, and mechanize proofs that chained MACs can provide the desired authenticity properties.
引用
收藏
页码:346 / 357
页数:12
相关论文
共 50 条
  • [1] Untangling Mechanized Proofs
    Pit-Claudel, Clement
    PROCEEDINGS OF THE 13TH ACM SIGPLAN INTERNATIONAL CONFERENCE ON SOFTWARE LANGUAGE ENGINEERING, SLE 2020, 2020, : 155 - 174
  • [2] Handling TSO in mechanized linearizability proofs
    Travkin, Oleg
    Wehrheim, Heike
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8855 : 132 - 147
  • [3] Mechanized proofs for a recursive authentication protocol
    Paulson, LC
    10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 84 - 94
  • [4] Mechanized proofs of opacity: a comparison of two techniques
    Derrick, John
    Doherty, Simon
    Dongol, Brijesh
    Schellhorn, Gerhard
    Travkin, Oleg
    Wehrheim, Heike
    FORMAL ASPECTS OF COMPUTING, 2018, 30 (05) : 597 - 625
  • [5] Computationally sound mechanized proofs of correspondence assertions
    Blanchet, Bruno
    20TH IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSFS20), PROCEEDINGS, 2007, : 97 - 111
  • [6] FASTLANE Is Opaque - a Case Study in Mechanized Proofs of Opacity
    Schellhorn, Gerhard
    Wedel, Monika
    Travkin, Oleg
    Koenig, Juergen
    Wehrheim, Heike
    SOFTWARE ENGINEERING AND FORMAL METHODS, SEFM 2018, 2018, 10886 : 105 - 120
  • [7] Mechanized Proofs of Adversarial Complexity and Application to Universal Composability
    Barbosa, Manuel
    Barthe, Gilles
    Gregoire, Benjamin
    Koutsos, Adrien
    Strub, Pierre-Yves
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2023, 26 (03)
  • [8] Mechanized Proofs of Adversarial Complexity and Application to Universal Composability
    Barbosa, Manuel
    Barthe, Gilles
    Gregoire, Benjamin
    Koutsos, Adrien
    Strub, Pierre-Yves
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 2541 - 2563
  • [9] THE PATH TO AUTHENTICITY IS PAVED WITH THE RIGHT CUES: A DECADE OF RESEARCH ON BRAND AUTHENTICITY
    Dropulic, Branka
    Ozretic Dosen, Durdana
    PROCEEDINGS OF FEB ZAGREB 12TH INTERNATIONAL ODYSSEY CONFERENCE ON ECONOMICS AND BUSINESS, 2021, 2021, 3 : 1082 - 1096
  • [10] The food authenticity network
    Elahi, Selvarani
    Ellison, Steve
    Woolfe, Mark
    Food Science and Technology (London), 2016, 30 (02): : 16 - 17