An executable specification language for planning attacks to security protocols

被引:4
|
作者
Aiello, LC [1 ]
Massacci, F [1 ]
机构
[1] Univ Roma La Sapienza, Dipartimento Informat & Sistemist, I-00198 Rome, Italy
关键词
security protocols; verification; specification language; planning; logic programs; model checking;
D O I
10.1109/CSFW.2000.856928
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We propose AL(SP) a Declarative Executable Specification Language for Planning Attacks to Security Protocols based on logic programming. III AL(SP) we carl give a declarative specification of a protocol with the natural semantics of send and recieve actions. We view a protocol trace as a plan to reach a goal, so that attacks are just plans caching goals that correspond to security violations, which carl be also declaratively specified. Building on results from logic programming and planning, we map the existence of an attack to a protocol into the existence of a model for the protocol specification that satisfies the specification of an attack. AL(SP) specifications are executable, as we can automatically search for attacks via any efficient model generator (such as smodels), that implements the stable model semantics of normal logic programs.; Thus, we come To a specification language which is easy to rise - protocol specifications are expressed at a high level of abstraction, and with an intuitive notation close to their traditional description - still keeping the rigor of a formal specification that, in addition, is executable.
引用
收藏
页码:88 / 102
页数:3
相关论文
共 50 条
  • [31] Type flaw attacks and prevention in security protocols
    Wang Juan
    Zhang Jingwei
    Zhang Huanguo
    PROCEEDINGS OF NINTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING, 2008, : 340 - +
  • [32] Security of Auditing Protocols Against Subversion Attacks
    Lv, Jiaxian
    Wang, Yi
    Su, Jinshu
    Chen, Rongmao
    Wu, Wenjun
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2020, 31 (02) : 193 - 206
  • [33] Data desynchronization attacks on RFID security protocols
    Cao, Zheng
    Ma, Jianfeng
    Yang, Lin
    Deng, Miaolei
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2013, 41 (04): : 65 - 69
  • [34] Some new attacks upon security protocols
    Lowe, G
    9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, : 162 - 169
  • [35] A Specification Language for Information Security Policies
    Garcia Garcia, Juan Manuel
    PROCEEDINGS OF THE 15TH AMERICAN CONFERENCE ON APPLIED MATHEMATICS AND PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTATIONAL AND INFORMATION SCIENCES 2009, VOLS I AND II, 2009, : 437 - +
  • [36] A Formal Specification and Verification Framework for Timed Security Protocols
    Li, Li
    Sun, Jun
    Liu, Yang
    Sun, Meng
    Dong, Jin-Song
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2018, 44 (08) : 725 - 746
  • [37] ETSI releases middlebox security protocols framework specification
    ETSI
    China Standardization, 2021, (01) : 56 - 56
  • [38] NP-SPEC: an executable specification language for solving all problems in NP
    Cadoli, M
    Ianni, G
    Palopoli, L
    Schaerf, A
    Vasile, D
    COMPUTER LANGUAGES, 2000, 26 (2-4): : 165 - 195
  • [39] NP-SPEC: An executable specification language for solving all problems in NP
    Cadoli, M
    Palopoli, L
    Schaerf, A
    Vasile, D
    PRACTICAL ASPECTS OF DECLARATIVE LANGUAGES, 1999, 1551 : 16 - 30
  • [40] EXECUTABLE SPECIFICATION OF STATIC SEMANTICS
    DESPEYROUX, T
    LECTURE NOTES IN COMPUTER SCIENCE, 1984, 173 : 215 - 233