Analysis of two authorization protocols using Colored Petri Nets

被引:4
|
作者
Seifi, Younes [1 ,2 ]
Suriadi, Suriadi [2 ]
Foo, Ernest [2 ]
Boyd, Colin [2 ]
机构
[1] Bu Ali Sina Univ, Hamadan, Iran
[2] Queensland Univ Technol, Brisbane, Qld 4001, Australia
关键词
Colored Petri Nets; CPN; CPN Tools; Security Analysis; TPM; SKAP; OSAP; Trusted Computing; ASK-CTL; VERIFICATION; ATTACK; LOGIC; TOOL;
D O I
10.1007/s10207-014-0243-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To prevent unauthorized access to protected trusted platform module (TPM) objects, authorization protocols, such as the object-specific authorization protocol (OSAP), have been introduced by the trusted computing group (TCG). By using OSAP, processes trying to gain access to the protected TPM objects need to prove their knowledge of relevant authorization data before access to the objects can be granted. Chen and Ryan's 2009 analysis has demonstrated OSAP's authentication vulnerability in sessions with shared authorization data. They also proposed the Session Key Authorization Protocol (SKAP) with fewer stages as an alternative to OSAP. Chen and Ryan's analysis of SKAP using ProVerif proves the authentication property. The purpose of this paper was to examine the usefulness of Colored Petri Nets (CPN) and CPN Tools for security analysis. Using OSAP and SKAP as case studies, we construct intruder and authentication property models in CPN. CPN Tools is used to verify the authentication property using a Dolev-Yao-based model. Verification of the authentication property in both models using the state space tool produces results consistent with those of Chen and Ryan.
引用
收藏
页码:221 / 247
页数:27
相关论文
共 50 条
  • [31] Using Colored Petri Nets for GPGPU Performance Modeling
    Madougou, Souley
    Varbanescu, Ana Lucia
    de Laat, Cees
    PROCEEDINGS OF THE ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS (CF'16), 2016, : 240 - 249
  • [32] Quantitative analysis of permutation capability with colored petri nets
    Bashirov, R
    Crespi, V
    MASCOTS 2005:13TH IEEE INTERNATIONAL SYMPOSIUM ON MODELING, ANALYSIS, AND SIMULATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS, 2005, : 463 - 470
  • [33] Application of colored petri nets in security protocol analysis
    Zhang, Jialin
    Miao, Xianghua
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ALGORITHMS, SOFTWARE ENGINEERING, AND NETWORK SECURITY, ASENS 2024, 2024, : 676 - 682
  • [34] Modeling and Analysis of Protein Synthesis and DNA Mutation Using Colored Petri Nets
    Yang, Jinliang
    Pu, Haitao
    Lian, Jian
    Gu, Jason
    Fan, Mingqu
    IEEE ACCESS, 2018, 6 : 22386 - 22400
  • [35] Profiling the publish/subscribe paradigm for automated analysis using colored Petri nets
    Abel Gómez
    Ricardo J. Rodríguez
    María-Emilia Cambronero
    Valentín Valero
    Software & Systems Modeling, 2019, 18 : 2973 - 3003
  • [36] Interactive web interfaces modeling, simulation and analysis using Colored Petri Nets
    Taffarel Brant-Ribeiro
    Rafael D. Araújo
    Igor E. Mendonça
    Michel S. Soares
    Renan G. Cattelan
    Software & Systems Modeling, 2019, 18 : 721 - 737
  • [37] Performance analysis of a photonic Manhattan Street Network using colored Petri Nets
    Anand, Ajay
    Reddy, B. V. R.
    Rajpal, Navin
    EUROPEAN SIMULATION AND MODELLING CONFERENCE 2007, 2007, : 173 - 177
  • [38] Analysis of the Properties of the Bluetooth Baseband Connection Establishment Using Colored Petri Nets
    Elena Villapol, Maria
    COMPUTACION Y SISTEMAS, 2012, 16 (04): : 433 - 446
  • [39] Interactive web interfaces modeling, simulation and analysis using Colored Petri Nets
    Brant-Ribeiro, Taffarel
    Araujo, Rafael D.
    Mendonca, Igor E.
    Soares, Michel S.
    Cattelan, Renan G.
    SOFTWARE AND SYSTEMS MODELING, 2019, 18 (01): : 721 - 737
  • [40] A Private Data Transfer Protocol Verification and Analysis Using Colored Petri Nets
    Shao, Fengjing
    Bin, Sheng
    Sun, Gengxin
    Sun, Rencheng
    ECONOMICS AND FINANCE RESEARCH, 2011, 4 : 188 - +