A Method for Patching Interleaving-Replay Attacks in Faulty Security Protocols

被引:6
|
作者
Lopez Pimentel, Juan Carlos [1 ]
Monroy, Raul [1 ]
Hutter, Dieter [1 ]
机构
[1] Tecnol Monterrey, Comp Sci Dept, Campus Estado Mexico Carretera Lago Guadalupe Km, Mexico City 52926, DF, Mexico
关键词
Fault localization; patching; replay attacks; security protocols; verification;
D O I
10.1016/j.entcs.2006.12.034
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The verification of security protocols has attracted a lot of interest in the formal methods community, yielding two main verification approaches: i) state exploration, e.g. FDR [8] and OFMC [2]; and ii) theorem proving, e.g. the Isabelle inductive method [12] and Coral [13]. Complementing formal methods, Abadi and Needham's principles aim to guide the design of security protocols in order to make them simple and, hopefully, correct [1]. We are interested in a problem related to verification but far less explored: the correction of faulty security protocols. Experience has shown that the analysis of counterexamples or failed proof attempts often holds the key to the completion of proofs and for the correction of a faulty model. In this paper, we introduce a method for patching faulty security protocols that are susceptible to an interleaving-replay attack. Our method makes use of Abadi and Needham's principles for the prudent engineering practice for cryptographic protocols in order to guide the location of the fault in a protocol as well as the proposition of candidate patches. We have run a test on our method with encouraging results. The test set includes 21 faulty security protocols borrowed from the Clark-Jacob library [5].
引用
收藏
页码:117 / 130
页数:14
相关论文
共 50 条
  • [1] A Method for Patching Interleaving-Replay Attacks in Faulty Security Protocols
    Computer Science Department, Tecnológico de Monterrey, Carretera al lago Guadalupe, Km 3.5, Atizapán, 52926, Mexico
    不详
    [J]. Electron. Notes Theor. Comput. Sci., 2007, 4 (117-130):
  • [2] Design guidelines for security protocols to prevent replay & parallel session attacks
    Jurcut, Anca D.
    Coffey, Toni
    Dojen, Reiner
    [J]. COMPUTERS & SECURITY, 2014, 45 : 255 - 273
  • [3] Design of Authentication Protocols Preventing Replay Attacks
    Li, Junhong
    [J]. 2009 INTERNATIONAL CONFERENCE ON FUTURE BIOMEDICAL INFORMATION ENGINEERING (FBIE 2009), 2009, : 362 - 365
  • [4] Algebraic Replay Attacks on Authentication in RFID Protocols
    Chikouche, Noureddine
    Cherif, Foudil
    Benmohammed, Mohamed
    [J]. ADVANCES IN SECURITY OF INFORMATION AND COMMUNICATION NETWORKS, 2013, 381 : 153 - +
  • [5] A formal analysis for capturing replay attacks in cryptographic protocols
    Gao, Han
    Bodei, Chiara
    Degano, Pierpaolo
    Nielson, Hanne Riis
    [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 150 - +
  • [6] Formally analysing a security protocol for replay attacks
    Long, Benjamin W.
    Fidge, Colin J.
    [J]. 2006 AUSTRALIAN SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2006, : 171 - +
  • [7] Uncovering attacks on security protocols
    Yang, W
    [J]. Third International Conference on Information Technology and Applications, Vol 2, Proceedings, 2005, : 572 - 575
  • [8] On the automated correction of security protocols susceptible to a replay attack
    Juan, C. Lopez P.
    Monroy, Raul
    Hutter, Dieter
    [J]. COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 594 - +
  • [9] Detecting collusion attacks in security protocols
    Chen, QF
    Chen, YPP
    Zhang, SC
    Zhang, CQ
    [J]. FRONTIERS OF WWW RESEARCH AND DEVELOPMENT - APWEB 2006, PROCEEDINGS, 2006, 3841 : 297 - 306
  • [10] Desynchronization attacks on RFID security protocols
    [J]. Deng, M. (dmlei2003@163.com), 1600, Universitas Ahmad Dahlan (11):