An executable specification language for planning attacks to security protocols

被引:4
|
作者
Aiello, LC [1 ]
Massacci, F [1 ]
机构
[1] Univ Roma La Sapienza, Dipartimento Informat & Sistemist, I-00198 Rome, Italy
关键词
security protocols; verification; specification language; planning; logic programs; model checking;
D O I
10.1109/CSFW.2000.856928
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We propose AL(SP) a Declarative Executable Specification Language for Planning Attacks to Security Protocols based on logic programming. III AL(SP) we carl give a declarative specification of a protocol with the natural semantics of send and recieve actions. We view a protocol trace as a plan to reach a goal, so that attacks are just plans caching goals that correspond to security violations, which carl be also declaratively specified. Building on results from logic programming and planning, we map the existence of an attack to a protocol into the existence of a model for the protocol specification that satisfies the specification of an attack. AL(SP) specifications are executable, as we can automatically search for attacks via any efficient model generator (such as smodels), that implements the stable model semantics of normal logic programs.; Thus, we come To a specification language which is easy to rise - protocol specifications are expressed at a high level of abstraction, and with an intuitive notation close to their traditional description - still keeping the rigor of a formal specification that, in addition, is executable.
引用
收藏
页码:88 / 102
页数:3
相关论文
共 50 条
  • [41] Method of Security Against Computer Attacks Based on an Analysis of Executable Machine Code
    Aranov, V. Yu.
    Zaborovsky, V. S.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2015, 49 (08) : 705 - 708
  • [42] Executable protocol specification in ESL
    Clarke, E
    German, S
    Lu, Y
    Veith, H
    Wang, D
    FORMAL METHODS IN COMPUTER-AIDED DESIGN, PROCEEDINGS, 2000, 1954 : 197 - 216
  • [43] An interface specification language for automatically analyzing cryptographic protocols
    Brackin, SH
    1997 SYMPOSIUM ON NETWORK AND DISTRIBUTED SYSTEM SECURITY, PROCEEDINGS, 1997, : 40 - 51
  • [44] Using the CORAL system to discover attacks on security protocols
    Steel, G
    Bundy, A
    Denney, E
    COMPUTER SYSTEMS: THEORY, TECHNOLOGY AND APPLICATIONS: A TRIBUTE TO ROGER NEEDHAM, 2004, : 279 - 285
  • [45] Formal verification of type flaw attacks in security protocols
    Long, BW
    ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2003, : 415 - 424
  • [47] How to prevent type flaw attacks on security protocols
    Heather, J
    Lowe, G
    Schneider, S
    13TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2000, : 255 - 268
  • [48] SSEL: An Extensible Specification Language for SoC Security
    Raj, Kshitij
    Hegde, Arrush
    Nath, Atul Prasad Deb
    Bhunia, Swamp
    Ray, Sandip
    PROCEEDINGS OF THE 2021 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2021,
  • [49] LOCKS: a property specification language for security goals
    Kumar, Rajesh
    Rensink, Arend
    Stoelinga, Marielle
    33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2018, : 1907 - 1915
  • [50] L0 - A TRULY CONCURRENT EXECUTABLE TEMPORAL LOGIC LANGUAGE FOR PROTOCOLS
    NESS, L
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1993, 19 (04) : 410 - 423