A Formal Specification and Verification Framework for Timed Security Protocols

被引:10
|
作者
Li, Li [1 ]
Sun, Jun [1 ]
Liu, Yang [2 ]
Sun, Meng [3 ]
Dong, Jin-Song [4 ]
机构
[1] Singapore Univ Technol & Design, ISTD, Singapore 487372, Singapore
[2] Nanyang Technol Univ, Sch Comp Engn, Singapore 639798, Singapore
[3] Peking Univ, Sch Math Sci, Beijing 100080, Peoples R China
[4] Natl Univ Singapore, Sch Comp, Singapore 487372, Singapore
关键词
Timed security protocol; timed applied pi-calculus; parameterized verification; secrecy and authentication; CRYPTOGRAPHIC PROTOCOLS; AUTHENTICATION; NETWORKS; LOGIC; TOOL;
D O I
10.1109/TSE.2017.2712621
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Nowadays, protocols often use time to provide better security. For instance, critical credentials are often associated with expiry dates in system designs. However, using time correctly in protocol design is challenging, due to the lack of time related formal specification and verification techniques. Thus, we propose a comprehensive analysis framework to formally specify as well as automatically verify timed security protocols. A parameterized method is introduced in our framework to handle timing parameters whose values cannot be decided in the protocol design stage. In this work, we first propose timed applied pi-calculus as a formal language for specifying timed security protocols. It supports modeling of continuous time as well as application of cryptographic functions. Then, we define its formal semantics based on timed logic rules, which facilitates efficient verification against various authentication and secrecy properties. Given a parameterized security protocol, our method either produces a constraint on the timing parameters which guarantees the security property satisfied by the protocol, or reports an attack that works for any parameter value. The correctness of our verification algorithm has been formally proved. We evaluate our framework with multiple timed and untimed security protocols and successfully find a previously unknown timing attack in Kerberos V.
引用
收藏
页码:725 / 746
页数:22
相关论文
共 50 条
  • [1] A Framework for Formal Verification of Security Protocols in C plus
    Pradeep, R.
    Sunitha, N. R.
    Ravi, V
    Verma, Sushma
    [J]. INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 163 - 175
  • [2] A Formal Security Framework for Mobile Agent Systems: Specification and Verification
    Loulou, Monia
    Kacem, Ahmed Hadj
    Mosbah, Mohamed
    Jmaiel, Mohamed
    [J]. CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 69 - 76
  • [3] Formal Specification and Verification of Security Guidelines
    Zhioua, Zeineb
    Roudier, Yves
    Ameur, Rabea Boulifa
    [J]. 2017 IEEE 22ND PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2017), 2017, : 267 - 273
  • [4] FORMAL SPECIFICATION AND VERIFICATION OF SECURE COMMUNICATION PROTOCOLS
    KNAPSKOG, SJ
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1990, 453 : 58 - 73
  • [5] Specification and formal verification of interconnect bus protocols
    Ivanov, L
    Nunna, R
    [J]. PROCEEDINGS OF THE 43RD IEEE MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS I-III, 2000, : 378 - 382
  • [6] Formal automatic verification of security protocols
    Xiao, Meihua
    Xue, Jinyun
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, 2006, : 566 - +
  • [7] Panel on languages for formal specification of security protocols
    Meadows, C
    [J]. 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 96 - 96
  • [8] Integrated Specification and Verification of Security Protocols and Policies
    Frau, Simone
    Torabi-Dashti, Mohammad
    [J]. 2011 IEEE 24TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2011, : 18 - 32
  • [9] FORMAL TECHNIQUES FOR THE SPECIFICATION, VERIFICATION AND CONSTRUCTION OF COMMUNICATION PROTOCOLS
    CHOI, TY
    [J]. IEEE COMMUNICATIONS MAGAZINE, 1985, 23 (10) : 46 - 52
  • [10] Formal verification of activity-based specification of protocols
    Anand, KC
    Shyamasundar, RK
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2000, 60 (05) : 639 - 676