首页> 外文期刊>Computers & Security >An intruder model with message inspection for model checking security protocols
【24h】

An intruder model with message inspection for model checking security protocols

机译:具有消息检查功能的入侵者模型,用于检查安全协议

获取原文
获取原文并翻译 | 示例

摘要

Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack actions against the ongoing protocol session(s). Any attempt to enumerate all messages that can be deduced by the intruder and the possible actions in all protocol steps results in an enormous branching of the model's state-space. In current work, we introduce a new intruder model that can be exploited for state-space reduction, optionally in combination with known techniques, such as partial order and symmetry reduction. The proposed intruder modeling approach called Message Inspection (MI) is based on enhancing the intruder's knowledge with metadata for the exchanged messages. In a preliminary simulation run, the intruder tags the analyzed messages with protocol-specific values for a set of predefined parameters. This metadata is used to identify possible attack actions, for which it is a priori known that they cannot cause a security violation. The MI algorithm selects attack actions that can be discarded, from an open-ended base of primitive attack actions. Thus, model checking focuses only on attack actions that may disclose a security violation. The most interesting consequence is a non-negligible state-space pruning, but at the same time our approach also allows customizing the behavior of the intruder model, in order e.g. to make it appropriate for model checking problems that involve liveness. We provide experimental results obtained with the SPIN model checker, for the Needham-Schroeder security protocol.
机译:模型检查安全协议基于入侵者模型,该入侵者模型表示对已交换消息的窃听或侦听,同时对正在进行的协议会话执行攻击操作。枚举入侵者可以推断出的所有消息以及所有协议步骤中可能采取的措施的任何尝试都会导致模型状态空间的巨大分支。在当前的工作中,我们介绍了一种新的入侵者模型,可以将其用于状态空间缩减,可以选择与已知技术结合使用,例如部分排序和对称性缩减。提议的入侵者建模方法称为消息检查(MI),它基于用于交换消息的元数据增强了入侵者的知识。在初步的模拟运行中,入侵者使用一组特定于协议的预定义参数的协议特定值标记分析的消息。此元数据用于标识可能的攻击行为,对于这些攻击行为,事先已知它们不会导致安全违规。 MI算法从原始攻击动作的开放式基础中选择可以丢弃的攻击动作。因此,模型检查仅关注可能揭示安全违规的攻击行为。最有趣的结果是不可忽略的状态空间修剪,但与此同时,我们的方法还允许自定义入侵者模型的行为,例如顺序为:使它适合涉及活动性的模型检查问题。我们为Needham-Schroeder安全协议提供了使用SPIN模型检查器获得的实验结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号