Security protocol specification and verification with AnBx

被引:7
|
作者
Bugliesi, Michele [1 ]
Calzavara, Stefano [1 ]
Modersheim, Sebastian [2 ]
Modesti, Paolo [3 ]
机构
[1] Univ Ca Foscari Venezia, Dipartimento Sci Ambientali Informat & Stat, Venice, Italy
[2] Danmarks Tekniske Univ, DTU Compute, Lyngby, Denmark
[3] Newcastle Univ, Sch Comp Sci, Newcastle Upon Tyne, Tyne & Wear, England
关键词
Protocol specification; Protocol verification; Model-checking; e-payment;
D O I
10.1016/j.jisa.2016.05.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Designing distributed protocols is complex and requires actions at very different levels: from the design of an interaction flow supporting the desired application-specific guarantees to the selection of the most appropriate network-level protection mechanisms. To tame this complexity, we propose AnBx, a formal protocol specification language based on the popular Alice & Bob notation. AnBx offers channels as the main abstraction for communication, providing different authenticity and/or confidentiality guarantees for message transmission. AnBx extends existing proposals in the literature with a novel notion of forwarding channels, enforcing specific security guarantees from the message originator to the final recipient along a number of intermediate forwarding agents. We give a formal semantics of AnBx in terms of a state transition system expressed in the AVISPA Intermediate Format. We devise an ideal channel model and a possible cryptographic implementation, and we show that, under mild restrictions, the two representations coincide, thus making AnBx amenable to automated verification with different tools. We demonstrate the benefits of the declarative specification style distinctive of AnBx by revisiting the design of two existing e-payment protocols: iKP and SET. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:46 / 63
页数:18
相关论文
共 50 条
  • [1] AnBx - Security Protocols Design and Verification
    Bugliesi, Michele
    Modesti, Paolo
    AUTOMATED REASONING FOR SECURITY PROTOCOL ANALYSIS AND ISSUES IN THE THEORY OF SECURITY, 2010, 6186 : 164 - 184
  • [2] AnBx: Automatic Generation and Verification of Security Protocols Implementations
    Modesti, Paolo
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015), 2016, 9482 : 156 - 173
  • [3] AnBx: Automatic generation and verification of security protocols implementations
    School of Computing Science, Newcastle University, Newcastle upon Tyne, United Kingdom
    Lect. Notes Comput. Sci., (156-173):
  • [4] On Verification of Implementation of Security Specification with Petri Nets' Protocol Inheritance
    Tang, Wenshan
    Gou, Zhaolong
    Bin Ahmadon, Mohd Anuaruddin
    Yamaguchi, Shingo
    2016 IEEE 5TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS, 2016,
  • [5] Security specification and verification
    Fenkam, P
    16TH ANNUAL INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2001), PROCEEDINGS, 2001, : 434 - 434
  • [6] PROTOCOL SPECIFICATION, TESTING AND VERIFICATION
    不详
    COMPUTER NETWORKS AND ISDN SYSTEMS, 1984, 8 (02): : 146 - 155
  • [7] PROTOCOL SPECIFICATION, TESTING AND VERIFICATION
    不详
    COMPUTER NETWORKS AND ISDN SYSTEMS, 1984, 8 (01): : 57 - 65
  • [8] PROTOCOL SPECIFICATION, TESTING AND VERIFICATION
    不详
    COMPUTER NETWORKS AND ISDN SYSTEMS, 1985, 10 (3-4): : 231 - 237
  • [9] Formal specification and security verification of the IDKE protocol using FDR model checking
    Soltwisch, R
    Tegeler, F
    Hogrefe, D
    2005 13TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS JOINTLY HELD WITH THE 2005 7TH IEEE MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS 1 AND 2, 2005, : 329 - 334
  • [10] Specification and verification of security policies in firewalls
    Jalili, R
    Rezvani, M
    EURASIA-ICT 2002: INFORMATION AND COMMUNICATION TECHNOLOGY, PROCEEDINGS, 2002, 2510 : 154 - 163