Pitfalls in Formal Reasoning about Security Protocols

被引:2
|
作者
Moebius, Nina [1 ]
Stenzel, Kurt [1 ]
Reif, Wolfgang [1 ]
机构
[1] Univ Augsburg, Inst Software & Syst Engn, D-8900 Augsburg, Germany
关键词
formal verification; security protocols;
D O I
10.1109/ARES.2010.36
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Formal verification can give more confidence in the security of cryptographic protocols. Application specific security properties like "The service provider does not loose money" can give even more confidence than standard properties like secrecy or authentication. However, it is surprisingly easy to get a meaningful property slightly wrong. The result is that an insecure protocol can be 'proven' secure. We illustrate the problem with a very small application, a copy card, that has only five different messages. The example is taken from a paper where the protocol is secure, but the proved property slightly wrong. We propose to solve the problem by incorporating more of the real-world application into the formal model.
引用
收藏
页码:248 / 253
页数:6
相关论文
共 50 条
  • [1] Formal Reasoning about Physical Properties of Security Protocols
    Basin, David
    Capkun, Srdjan
    Schaller, Patrick
    Schmidt, Benedikt
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (02)
  • [2] Formal Reasoning on Authentication in Security Protocols
    Fattahi, Jaouhar
    Mejri, Mohamed
    Ghayoula, Ridha
    Pricop, Emil
    2016 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2016, : 282 - 289
  • [3] Prolog-Based Formal Reasoning for Security Protocols
    Jiang, Rongrong
    Wang, Chuanbin
    Xu, Jiejie
    Yu, Jiangfen
    PARALLEL AND DISTRIBUTED COMPUTING AND NETWORKS, 2011, 137 : 71 - +
  • [4] Reasoning about minimal anonymity in security protocols
    Tiplea, Ferucio Laurentiu
    Vamanu, Loredana
    Varlan, Cosmin
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (03): : 828 - 842
  • [5] Constructing and Reasoning About Security Protocols Using Invariants
    Mooij, Arjan J.
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2008, 201 : 99 - 126
  • [6] Toward Reasoning about Security Protocols: A Semantic Approach
    Hommersom, Arjen
    Meyer, John-Jules
    de Vink, Erik
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 126 : 53 - 75
  • [7] Formal Reasoning About the Security of Amazon Web Services
    Cook, Byron
    COMPUTER AIDED VERIFICATION (CAV 2018), PT I, 2018, 10981 : 38 - 47
  • [8] Formal Modeling and Reasoning about the Android Security Framework
    Armando, Alessandro
    Costa, Gabriele
    Merlo, Alessio
    TRUSTWORTHY GLOBAL COMPUTING, TGC 2013, 2013, 8358 : 64 - 81
  • [9] A formal approach for reasoning about a class of Diffle-Hellman protocols
    Delicata, R
    Schneider, S
    FORMAL ASPECTS IN SECURITY AND TRUST, 2006, 3866 : 34 - 46
  • [10] Invariant-based reasoning about parameterized security protocols
    Mooij, Arjan J.
    FORMAL ASPECTS OF COMPUTING, 2010, 22 (01) : 63 - 81