Verifying Security Protocols: An ASM Approach
نویسندگان
چکیده
In this paper we present a modeling technique for security protocols using Abstract State Machines [BS03,Gur95] (ASMs). We describe how we model the different agents in the scenario, the attacker and the communication between them.
منابع مشابه
Verifying Smart Card Applications: An ASM Approach
We present a formal model for security protocols of smart card applications using Abstract State Machines [BS03, Gur95] (ASMs) and a suitable method for verifying security properties of such protocols. The main part of this article describes the structure of the protocol-ASM and all its relevant parts. Integrated in the ASM are all relevant aspects of the scenario: The agents participating in t...
متن کاملAutomatic Approach of Provable Security
Abstract:Probable security is an important criteria for analyzing the security of cryptographic protocols. However, writing and verifying proofs by hand are prone to errors. This paper introduces the game-based approach of writing security proofs and its automatic technique. It advocates the automatic security proof approach based on process calculus, and presents the initial game and observati...
متن کاملVerifying Security Protocols with Timestamps via Translation to Timed Automata
In this paper we show a general method of proving authentication and integrity of time dependent security protocols by applying powerful model checking tools originally developed for verifying properties of timed automata. Our approach consists in specifying a security protocol, possibly with timestamps, in a higher-level language and translating automatically the specification to a timed autom...
متن کاملTemporal Logic-based Modeling and Analysis of ASM Designs
Abstract State Machines(ASMs) constitute the basis of an alternative approach to mathematical modelling of discrete dynamic systems. The ASM approach provides an expressive means to specify the operational behavior of a system, but it does not come equipped with a(fixed) logical proof system. Several formal techniques of verifying correctness of ASM designs based on a translation into variants ...
متن کاملTAuth: Verifying Timed Security Protocols
Quantitative timing is often relevant to the security of systems, like web applications, cyber-physical systems, etc. Verifying timed security protocols is however challenging as both arbitrary attacking behaviors and quantitative timing may lead to undecidability. In this work, we develop a service framework to support intuitive modeling of the timed protocol, as well as automatic verification...
متن کامل