首页> 外文OA文献 >A Formal Analysis of Complex Type Flaw Attacks on Security Protocols
【2h】

A Formal Analysis of Complex Type Flaw Attacks on Security Protocols

机译:对安全协议的复杂类型缺陷攻击的形式分析

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

A simple type confusion attack occurs in a security protocol, when a principal interprets data of one type as data of another. These attacks can be successfully prevented by “tagging” types of each field of a message. Complex type confusions occur instead when tags can be confused with data and when fields or sub-segments of fields may be confused with concatenations of fields of other types. Capturing these kinds of confusions is not easy in a process calculus setting, where it is generally assumed that messages are correctly interpreted. In this paper, we model in the process calculus LySa only the misinterpretation due to the confusion of a concatenation of fields with a single field, by extending the notation of one-to-one variable binding to many-to-one binding. We further present a formal way of detecting these possible misinterpretations, based on a Control Flow Analysis for this version of the calculus. The analysis over-approximates all the possible behaviour of a protocol, including those effected by these type confusions. As an example, we considered the amended Needham-Schroeder symmetric protocol, where we succeed in detecting the type confusion that lead to a complex type flaw attacks it is subject to. Therefore, the analysis can capture potential type confusions of this kind on security protocols, besides other security properties such as confidentiality, freshness and message authentication.
机译:当主体将一种类型的数据解释为另一种类型的数据时,在安全协议中会发生简单的类型混淆攻击。通过“标记”消息每个字段的类型,可以成功防止这些攻击。相反,当标记可以与数据混淆时,或者当字段或字段的子段可能与其他类型的字段的混淆时,就会发生复杂类型的混淆。在过程演算设置中,要捕获这些类型的混乱并不容易,因为通常会假设消息已正确解释。在本文中,我们通过将一对一变量绑定的概念扩展为多对一绑定,在过程演算LySa中仅对由于字段串联与单个字段混淆而造成的误解进行建模。我们将基于此版本演算的“控制流分析”,进一步提出检测这些可能的误解的正式方法。该分析过度估计了协议的所有可能行为,包括受这些类型混淆影响的行为。例如,我们考虑了经过修改的Needham-Schroeder对称协议,在该协议中,我们成功地检测出类型混淆,该混淆导致了它所遭受的复杂类型缺陷攻击。因此,除了其他安全属性(例如机密性,更新性和消息身份验证)之外,分析还可以捕获这种对安全协议的潜在类型混淆。

著录项

  • 作者

    HAN GAO; BODEI C; DEGANO P;

  • 作者单位
  • 年度 2008
  • 总页数
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号