首页> 外文期刊>Journal of applied non-classical logics >LTL model checking for security protocols
【24h】

LTL model checking for security protocols

机译:LTL模型检查安全协议

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

Most model checking techniques for security protocols make a number of simplifying assumptions on the protocol and/or on its execution environment that greatly complicate or even prevent their applicability in some important cases. For instance, most techniques assume that communication between honest principals is controlled by a Dolev-Yao intruder, i.e. a malicious agent capable to overhear, divert, and fake messages. Yet we might be interested in establishing the security of a protocol that relies on a less unsecure channel (e.g. a confidential channel provided by some other protocol sitting lower in the protocol stack).rnIn this paper we propose a general model for security protocols based on the set-rewriting formalism that, coupled with the use of LTL, allows for the specification of assumptions on principals and communication channels as well as of complex security properties that are normally not handled by state-of-the-art security protocol analysers.rnBy using our approach we have been able to formalise all the assumptions required by the ASW protocol for optimistic fair exchange and some of its key security properties. Besides the previously reported attacks on the protocol, we report a new attack on a patched version of the protocol.
机译:大多数用于安全协议的模型检查技术都对该协议和/或其执行环境进行了许多简化的假设,这些假设在某些重要情况下极大地复杂化甚至阻止了其适用性。例如,大多数技术都假定诚实的主体之间的通信是由Dolev-Yao入侵者控制的,即入侵者能够窃听,转移和伪造消息。然而,我们可能有兴趣建立依赖不那么不安全的通道(例如,位于协议栈中较低位置的其他协议提供的机密通道)的协议的安全性。在本文中,我们提出了一种基于集重写形式主义,再加上LTL的使用,允许规范有关主体和通信通道的假设以及通常不由最新安全协议分析器处理的复杂安全属性。使用我们的方法,我们已经能够形式化ASW协议要求的所有乐观乐观交换及其一些关键安全属性的假设。除了先前报告的对该协议的攻击之外,我们还报告了对该协议的修补版本的新攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号