Modelling Attacker with Deciding Security Properties by Induction and Deduction


KIRSAL EVER Y., Eneh A., Gemikonakli O., Mostarda L.

IEEE 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), Barcelona, İspanya, 25 - 28 Mart 2013, ss.1082-1087, (Tam Metin Bildiri) identifier identifier

  • Yayın Türü: Bildiri / Tam Metin Bildiri
  • Doi Numarası: 10.1109/waina.2013.16
  • Basıldığı Şehir: Barcelona
  • Basıldığı Ülke: İspanya
  • Sayfa Sayıları: ss.1082-1087
  • Orta Doğu Teknik Üniversitesi Kuzey Kıbrıs Kampüsü Adresli: Hayır

Özet

Formal methods for verifying cryptographic protocols are used to assist in ensuring that authentication protocols meet their specifications. Model checking techniques such as CSP and FDR checker, are widely acknowledged for effectively and efficiently revealing flaws in protocols faster than most other contemporaries. Essentially, model checking involves a detailed search of all the states reachable by the components of a protocol model. In the models that describe authentication protocols, the components, regarded as processes, are the principals including intruder (attacker) and parameters for authentication such as keys, nonces, tickets, and certificates. In this paper, transactions of proposed protocol models rely on trusted three-way authentication mechanisms while intruder capabilities are based on possible inductions and deductions of sequential processes. This research attempts to combine the two methods in model checking in order to realise an abstract description of intruder with enhanced capabilities.