Analysis of two authorization protocols using Colored Petri Nets

被引:4
|
作者
Seifi, Younes [1 ,2 ]
Suriadi, Suriadi [2 ]
Foo, Ernest [2 ]
Boyd, Colin [2 ]
机构
[1] Bu Ali Sina Univ, Hamadan, Iran
[2] Queensland Univ Technol, Brisbane, Qld 4001, Australia
关键词
Colored Petri Nets; CPN; CPN Tools; Security Analysis; TPM; SKAP; OSAP; Trusted Computing; ASK-CTL; VERIFICATION; ATTACK; LOGIC; TOOL;
D O I
10.1007/s10207-014-0243-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To prevent unauthorized access to protected trusted platform module (TPM) objects, authorization protocols, such as the object-specific authorization protocol (OSAP), have been introduced by the trusted computing group (TCG). By using OSAP, processes trying to gain access to the protected TPM objects need to prove their knowledge of relevant authorization data before access to the objects can be granted. Chen and Ryan's 2009 analysis has demonstrated OSAP's authentication vulnerability in sessions with shared authorization data. They also proposed the Session Key Authorization Protocol (SKAP) with fewer stages as an alternative to OSAP. Chen and Ryan's analysis of SKAP using ProVerif proves the authentication property. The purpose of this paper was to examine the usefulness of Colored Petri Nets (CPN) and CPN Tools for security analysis. Using OSAP and SKAP as case studies, we construct intruder and authentication property models in CPN. CPN Tools is used to verify the authentication property using a Dolev-Yao-based model. Verification of the authentication property in both models using the state space tool produces results consistent with those of Chen and Ryan.
引用
收藏
页码:221 / 247
页数:27
相关论文
共 50 条
  • [1] Analysis of two authorization protocols using Colored Petri Nets
    Younes Seifi
    Suriadi Suriadi
    Ernest Foo
    Colin Boyd
    International Journal of Information Security, 2015, 14 : 221 - 247
  • [2] Analysis of Concurrent Security Protocols Using Colored Petri Nets
    Long, Shigong
    2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 1, PROCEEDINGS, 2009, : 227 - 230
  • [3] Modeling and Analysis of Security Protocols Using Colored Petri Nets
    Xu, Yang
    Xie, Xiaoyao
    JOURNAL OF COMPUTERS, 2011, 6 (01) : 19 - 27
  • [4] Modeling and Analysis of Authentication Protocols. Using Colored Petri Nets
    Xu, Yang
    Xie, Xiaoyao
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 443 - 448
  • [5] Considering Time in Formal Analysis of Security Protocols Using Colored Petri Nets
    Xu, Meng
    Su, Guiping
    Ding, Yanlan
    2008 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS SYMPOSIA, PROCEEDINGS, 2008, : 63 - 68
  • [6] Specification of timed authentication protocols with colored Petri nets
    Jakubowska, G
    Srebrny, M
    ADVANCED COMPUTER SYSTEMS, PROCEEDINGS, 2002, 664 : 383 - 392
  • [7] Using colored Petri nets to simulate object Petri nets
    Corchado, FFR
    Gallegos, FZ
    Jiménez, AA
    Dávila, HIP
    International Conference on Computing, Communications and Control Technologies, Vol 5, Proceedings, 2004, : 27 - 31
  • [8] An Integrated Model to Analyze Cryptographic Protocols with Colored Petri Nets
    Wei, Jin
    Su, Guiping
    Xu, Meng
    11TH IEEE HIGH ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS, 2008, : 457 - 460
  • [9] A General Model Checking Method of Electronic Transaction Protocols Using Colored Petri Nets
    Xu, Meng
    Su, Guiping
    Wei, Jin
    HIS 2009: 2009 NINTH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS, VOL 2, PROCEEDINGS, 2009, : 298 - 303
  • [10] Formal Modeling and Analysis of SIP Using Colored Petri Nets
    Bai, Yunli
    Ye, Xinming
    Ma, Yuanfei
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,