Analysis of two authorization protocols using Colored Petri Nets

被引:4
|
作者
Seifi, Younes [1 ,2 ]
Suriadi, Suriadi [2 ]
Foo, Ernest [2 ]
Boyd, Colin [2 ]
机构
[1] Bu Ali Sina Univ, Hamadan, Iran
[2] Queensland Univ Technol, Brisbane, Qld 4001, Australia
关键词
Colored Petri Nets; CPN; CPN Tools; Security Analysis; TPM; SKAP; OSAP; Trusted Computing; ASK-CTL; VERIFICATION; ATTACK; LOGIC; TOOL;
D O I
10.1007/s10207-014-0243-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To prevent unauthorized access to protected trusted platform module (TPM) objects, authorization protocols, such as the object-specific authorization protocol (OSAP), have been introduced by the trusted computing group (TCG). By using OSAP, processes trying to gain access to the protected TPM objects need to prove their knowledge of relevant authorization data before access to the objects can be granted. Chen and Ryan's 2009 analysis has demonstrated OSAP's authentication vulnerability in sessions with shared authorization data. They also proposed the Session Key Authorization Protocol (SKAP) with fewer stages as an alternative to OSAP. Chen and Ryan's analysis of SKAP using ProVerif proves the authentication property. The purpose of this paper was to examine the usefulness of Colored Petri Nets (CPN) and CPN Tools for security analysis. Using OSAP and SKAP as case studies, we construct intruder and authentication property models in CPN. CPN Tools is used to verify the authentication property using a Dolev-Yao-based model. Verification of the authentication property in both models using the state space tool produces results consistent with those of Chen and Ryan.
引用
收藏
页码:221 / 247
页数:27
相关论文
共 50 条
  • [41] Formal Analysis of FPH Contract Signing Protocol Using Colored Petri Nets
    Payeras-Capella, Magdalena
    Mut-Puigserver, Macia
    Isern-Deya, Andreu Pere
    Ferrer-Gomila, Josep L.
    Huguet-Rotger, Llorenc
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, 2009, 19 : 101 - 120
  • [42] Profiling the publish/subscribe paradigm for automated analysis using colored Petri nets
    Gomez, Abel
    Rodriguez, Ricardo J.
    Cambronero, Maria-Emilia
    Valero, Valentin
    SOFTWARE AND SYSTEMS MODELING, 2019, 18 (05): : 2973 - 3003
  • [43] THE VERIFICATION OF COMMUNICATION PROTOCOLS USING NUMERICAL PETRI NETS
    SYMONS, FJW
    AUSTRALIAN TELECOMMUNICATION RESEARCH, 1980, 14 (01): : 34 - 38
  • [44] COLORED PETRI NETS AND THE MATRIX APPROACH
    BELIKOV, VK
    RUTNER, YF
    PROGRAMMING AND COMPUTER SOFTWARE, 1988, 14 (03) : 120 - 124
  • [45] Modeling and analysis of security protocols using role based specifications and Petri nets
    Bouroulet, Roland
    Devillers, Raymond
    Klaudel, Hanna
    Pelz, Elisabeth
    Pommereau, Franck
    APPLICATIONS AND THEORY OF PETRI NETS, 2008, 5062 : 72 - +
  • [46] Syntactical colored Petri nets reductions
    Evangelista, S
    Haddad, S
    Pradat-Peyre, JF
    AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS, PROCEEDINGS, 2005, 3707 : 202 - 216
  • [47] Towards reusable Colored Petri Nets
    Lee, NH
    Hong, JE
    Cha, SD
    Bae, DH
    SOFTWARE ENGINEERING FOR PARALLEL AND DISTRIBUTED SYSTEMS - INTERNATIONAL SYMPOSIUM PROCEEDINGS, 1998, : 223 - 229
  • [48] Composition of software artifacts modelled using Colored Petri nets
    da Silva, LD
    Perkusich, A
    SCIENCE OF COMPUTER PROGRAMMING, 2005, 56 (1-2) : 171 - 189
  • [49] VALIDATION OF A VLSI CHIP USING HIERARCHICAL COLORED PETRI NETS
    SHAPIRO, RM
    MICROELECTRONICS AND RELIABILITY, 1991, 31 (04): : 607 - 625
  • [50] Manufacturing Scheduling Using Colored Petri Nets and Reinforcement Learning
    Drakaki, Maria
    Tzionas, Panagiotis
    APPLIED SCIENCES-BASEL, 2017, 7 (02):