Logic of Events for Proving Security Properties of Protocols

被引:11
|
作者
Xiao, Meihua [1 ]
Bickford, Mark [2 ]
机构
[1] Nanchang Univ, Sch Informat, Nanchang 330031, Peoples R China
[2] Cornell Univ, Dept Comp Sci, Ithaca, NY 14850 USA
关键词
Cryptographic Protocols; Formal Analysis; Logic of Events;
D O I
10.1109/WISM.2009.111
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Formal methods are vital for ensuring the security and reliability of the network systems. We propose a promising method to check security properties of cryptographic protocols using logic of events theory. The logic is designed around a message automaton with actions for possible protocol steps including generating new nonces, sending and receiving messages, and performing encryption, decryption and digital signature verification actions. We figure out types for the keys, nonces, and messages of the protocol and present novel proof rules and mechanism for protocol actions, temporal reasoning, and a specialized form of invariance rule. It puts no bound on the size of the principal and requires no state space enumeration. Our main theorem guarantees that any well-typed protocol is robustly safe under attack while reasoning only about the actions of honest principals in the protocol.
引用
收藏
页码:519 / +
页数:2
相关论文
共 50 条
  • [41] Metareasoning about Security Protocols using Distributed Temporal Logic
    Caleiro, Carlos
    Vigano, Luca
    Basin, David
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 125 (01) : 67 - 89
  • [42] Programming and Proving with Distributed Protocols
    Sergey, Ilya
    Wilcox, James R.
    Tatlock, Zachary
    PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2018, 2
  • [43] Proving properties of continuous systems: Qualitative simulation and temporal logic
    Shults, B
    Kuipers, BJ
    ARTIFICIAL INTELLIGENCE, 1997, 92 (1-2) : 91 - 129
  • [44] Proving properties of constraint logic programs by eliminating existential variables
    Pettorossi, Alberto
    Proietti, Maurizio
    Senni, Valerio
    LOGIC PROGRAMMING, PROCEEDINGS, 2006, 4079 : 179 - 195
  • [45] Proving properties of term rewrite systems via logic programs
    Limet, S
    Salzer, G
    REWRITING TECHNIQUES AND APPLICATIONS, PROCEEDINGS, 2004, 3091 : 170 - 184
  • [46] Security Proof of KerNeeS Protocol Based on Logic of Events
    Yang, Ke
    Xiao, Meihua
    Chen, Jia
    THEORETICAL COMPUTER SCIENCE (NCTCS 2018), 2018, 882 : 61 - 79
  • [47] Proving Flow Security of Sequential Logic via Automatically-Synthesized Relational Invariants
    Kwon, Hyoukjun
    Harris, William
    Esmaeilzadeh, Hadi
    2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 420 - 435
  • [48] How to Exchange Security Events? Overview and Evaluation of Formats and Protocols
    Steinberger, Jessica
    Sperotto, Anna
    Golling, Mario
    Baier, Harald
    PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), 2015, : 261 - 269
  • [49] A Short Introduction to Two Approaches in Formal Verification of Security Protocols: Model Checking and Theorem Proving
    Pourpouneh, Mohsen
    Ramezanian, Rasoul
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 8 (01): : 3 - 24
  • [50] Partial model checking and theorem proving for ensuring security properties
    Martinelli, F
    11TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP - PROCEEDINGS, 1998, : 44 - 52