Analysis of two authorization protocols using Colored Petri Nets

被引:4
|
作者
Seifi, Younes [1 ,2 ]
Suriadi, Suriadi [2 ]
Foo, Ernest [2 ]
Boyd, Colin [2 ]
机构
[1] Bu Ali Sina Univ, Hamadan, Iran
[2] Queensland Univ Technol, Brisbane, Qld 4001, Australia
关键词
Colored Petri Nets; CPN; CPN Tools; Security Analysis; TPM; SKAP; OSAP; Trusted Computing; ASK-CTL; VERIFICATION; ATTACK; LOGIC; TOOL;
D O I
10.1007/s10207-014-0243-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To prevent unauthorized access to protected trusted platform module (TPM) objects, authorization protocols, such as the object-specific authorization protocol (OSAP), have been introduced by the trusted computing group (TCG). By using OSAP, processes trying to gain access to the protected TPM objects need to prove their knowledge of relevant authorization data before access to the objects can be granted. Chen and Ryan's 2009 analysis has demonstrated OSAP's authentication vulnerability in sessions with shared authorization data. They also proposed the Session Key Authorization Protocol (SKAP) with fewer stages as an alternative to OSAP. Chen and Ryan's analysis of SKAP using ProVerif proves the authentication property. The purpose of this paper was to examine the usefulness of Colored Petri Nets (CPN) and CPN Tools for security analysis. Using OSAP and SKAP as case studies, we construct intruder and authentication property models in CPN. CPN Tools is used to verify the authentication property using a Dolev-Yao-based model. Verification of the authentication property in both models using the state space tool produces results consistent with those of Chen and Ryan.
引用
收藏
页码:221 / 247
页数:27
相关论文
共 50 条
  • [21] A NOTE ON COLORED PETRI NETS
    PETERSON, JL
    INFORMATION PROCESSING LETTERS, 1980, 11 (01) : 40 - 43
  • [22] HIERARCHIES IN COLORED PETRI NETS
    HUBER, P
    JENSEN, K
    SHAPIRO, RM
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 483 : 313 - 341
  • [23] ON THE INVARIANTS OF COLORED PETRI NETS
    NARAHARI, Y
    VISWANADHAM, N
    LECTURE NOTES IN COMPUTER SCIENCE, 1986, 222 : 330 - 345
  • [24] Modeling of railway nets with colored Petri nets
    Paliulis, E
    Pranevicius, H
    TRANSPORT MEANS 2004: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE, 2004, : 39 - 43
  • [25] Modeling Software Contention Using Colored Petri Nets
    Roy, Nilabja
    Dabholkar, Akshay
    Hamm, Nathan
    Dowdy, Larry
    Schmidt, Douglas
    2008 IEEE INTERNATIONAL SYMPOSIUM ON MODELING, ANALYSIS & SIMULATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS (MASCOTS), 2008, : 243 - 250
  • [26] Implementation of Feeder Automation Using Colored Petri Nets
    Lin, Chia-Hung
    Li, Chung-Sheng
    Ku, Te-Tien
    Ho, Chin-Ying
    SENSORS AND MATERIALS, 2021, 33 (04) : 1273 - 1285
  • [27] AUTOMATING THE CONVERSION OF COLORED PETRI NETS WITH QUALITATIVE TOKENS INTO COLORED PETRI NETS WITH QUANTITATIVE TOKENS
    Hlomozda, D. K.
    Glybovets, M. M.
    Maksymets, O. M.
    CYBERNETICS AND SYSTEMS ANALYSIS, 2018, 54 (04) : 650 - 661
  • [28] Flexible Negotiation Modeling by Using Colored Petri Nets
    Bai, Quan
    Zhang, Minjie
    Sim, Kwang Mong
    JOURNAL OF INFORMATION TECHNOLOGY RESEARCH, 2009, 2 (03) : 1 - 16
  • [29] Correctness analysis of snoopy cache coherence protocols using Petri nets
    Hassan, A
    Mahgoub, I
    INTERNATIONAL SOCIETY FOR COMPUTERS AND THEIR APPLICATIONS 10TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 1997, : 338 - 343
  • [30] A reliability analysis of distributed programs with Colored Petri Nets
    Hong, SB
    Kim, K
    SMC '97 CONFERENCE PROCEEDINGS - 1997 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-5: CONFERENCE THEME: COMPUTATIONAL CYBERNETICS AND SIMULATION, 1997, : 3975 - 3980