A Formal Specification and Verification Framework for Timed Security Protocols

被引:10
|
作者
Li, Li [1 ]
Sun, Jun [1 ]
Liu, Yang [2 ]
Sun, Meng [3 ]
Dong, Jin-Song [4 ]
机构
[1] Singapore Univ Technol & Design, ISTD, Singapore 487372, Singapore
[2] Nanyang Technol Univ, Sch Comp Engn, Singapore 639798, Singapore
[3] Peking Univ, Sch Math Sci, Beijing 100080, Peoples R China
[4] Natl Univ Singapore, Sch Comp, Singapore 487372, Singapore
关键词
Timed security protocol; timed applied pi-calculus; parameterized verification; secrecy and authentication; CRYPTOGRAPHIC PROTOCOLS; AUTHENTICATION; NETWORKS; LOGIC; TOOL;
D O I
10.1109/TSE.2017.2712621
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Nowadays, protocols often use time to provide better security. For instance, critical credentials are often associated with expiry dates in system designs. However, using time correctly in protocol design is challenging, due to the lack of time related formal specification and verification techniques. Thus, we propose a comprehensive analysis framework to formally specify as well as automatically verify timed security protocols. A parameterized method is introduced in our framework to handle timing parameters whose values cannot be decided in the protocol design stage. In this work, we first propose timed applied pi-calculus as a formal language for specifying timed security protocols. It supports modeling of continuous time as well as application of cryptographic functions. Then, we define its formal semantics based on timed logic rules, which facilitates efficient verification against various authentication and secrecy properties. Given a parameterized security protocol, our method either produces a constraint on the timing parameters which guarantees the security property satisfied by the protocol, or reports an attack that works for any parameter value. The correctness of our verification algorithm has been formally proved. We evaluate our framework with multiple timed and untimed security protocols and successfully find a previously unknown timing attack in Kerberos V.
引用
下载
收藏
页码:725 / 746
页数:22
相关论文
共 50 条
  • [21] On Backward-Style Verification for Timed Anonymity of Security Protocols
    Kawabe, Yoshinobu
    Ito, Nobuhiro
    2016 IEEE 5TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS, 2016,
  • [22] Using Backward Induction Techniques in (Timed) Security Protocols Verification
    Kurkowski, Miroslaw
    Siedlecka-Lamch, Olga
    Dudek, Pawel
    COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2013, 2013, 8104 : 265 - 276
  • [23] Formal verification: an imperative step in the design of security protocols
    Coffey, T
    Dojen, R
    Flanagan, T
    COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2003, 43 (05): : 601 - 618
  • [24] An improved method for formal security verification of cryptographic protocols
    Watanabe, H
    Fujiwara, T
    Kasami, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1996, E79A (07) : 1089 - 1096
  • [25] Formal verification of type flaw attacks in security protocols
    Long, BW
    ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2003, : 415 - 424
  • [26] Security in Wireless Sensor Networks: A formal verification of protocols
    Nandi, Giann Spilere
    Pereira, David
    Vigil, Martin
    Moraes, Ricardo
    Morales, Analucia Schiaffino
    Araujo, Gustavo
    2019 IEEE 17TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2019, : 425 - 431
  • [27] Formal Verification of Security Protocols: the Squirrel Prover (Keynote)
    Delaune, Stephanie
    FOUNDATIONS AND PRACTICE OF SECURITY, PT II, FPS 2023, 2024, 14552 : XI - XIV
  • [28] Formal Verification of Security Protocols: the Squirrel Prover (Keynote)
    Delaune, Stephanie
    FOUNDATIONS AND PRACTICE OF SECURITY, PT I, FPS 2023, 2024, 14551 : XI - XIV
  • [29] An Automated Framework for Formal Verification of Timed Continuous Petri Nets
    Kloetzer, Marius
    Mahulea, Cristian
    Belta, Calin
    Silva, Manuel
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2010, 6 (03) : 460 - 471
  • [30] Formal specification and verification method of concurrent and distributed systems by restricted timed automata
    Yamane, S
    TRANSFORMATION-BASED REACTIVE SYSTEMS DEVELOPMENT, 1997, 1231 : 169 - 183