Skip to main content

Validating Security Protocols under the General Attacker

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5511))

Abstract

Security protocols have been analysed using a variety of tools and focusing on a variety of properties. Most findings assume the ever so popular Dolev-Yao threat model. A more recent threat model called the Rational Attacker [1] sees each protocol participant decide whether or not to conform to the protocol upon their own cost/benefit analysis. Each participant neither colludes nor shares knowledge with anyone, a feature that rules out the applicability of existing equivalence results in the Dolev-Yao model. Aiming at mechanical validation, we abstract away the actual cost/benefit analysis and obtain the General Attacker threat model, which sees each principal blindly act as a Dolev-Yao attacker.

The analysis of security protocols under the General Attacker threat model brings forward yet more insights: retaliation attacks and anticipation attacks are our main findings, while the tool support can scale up to the new analysis at a negligible price. The general threat model for security protocols based on set-rewriting that was adopted in AVISPA [2] is leveraged so as to express the General Attacker. The state-of-the-art model checker SATMC [3] is then used to automatically validate a protocol under the new threats, so that retaliation and anticipation attacks can automatically be found.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bella, G.: The Rational Attacker (2008) (invited talk at SAP Research France, Sophia Antipolis), http://www.dmi.unict.it/~giamp/Seminars/rationalattackerSAP08.pdf

  2. Armando, A., Basin, D.A., Boichut, Y., Chevalier, Y., Compagna, L., Cuéllar, J., Drielsma, P.H., Héam, P.C., Kouchnarenko, O., Mantovani, J., Mödersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganò, L., Vigneron, L.: The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281–285. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  3. Armando, A., Compagna, L.: SAT-based Model-Checking for Security Protocols Analysis. International Journal of Information Security 7(1), 3–32 (2008)

    Article  MATH  Google Scholar 

  4. Abadi, M., Gordon, A.: A calculus for cryptographic protocols: the spi calculus. Information and Computation 148(1), 1–70 (1999)

    Article  MathSciNet  MATH  Google Scholar 

  5. Ryan, P.Y.A., Schneider, S., Goldsmith, M., Lowe, G., Roscoe, A.W.: Modelling and Analysis of Security Protocols. In: AW (2001)

    Google Scholar 

  6. Fábrega, F.J.T., Herzog, J.C., Guttman, J.D.: Strand spaces: Proving security protocols correct. Journal of Computer Security 7, 191–230 (1999)

    Article  Google Scholar 

  7. Caleiro, C., Viganò, L., Basin, D.: Relating strand spaces and distributed temporal logic for security protocol analysis. Logic Journal of the IGPL 13(6), 637–663 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  8. Bella, G.: Formal Correctness of Security Protocols. In: Information Security and Cryptography. Springer, Heidelberg (2007)

    Google Scholar 

  9. Paulson, L.C.: The inductive approach to verifying cryptographic protocols. Journal of Computer Security 6, 85–128 (1998)

    Article  Google Scholar 

  10. Blanchet, B.: Automatic verification of cryptographic protocols: a logic programming approach. In: Proceedings of the 5th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, Uppsala, Sweden, August 27-29, pp. 1–3 (2003)

    Google Scholar 

  11. Lowe, G.: Breaking and Fixing the Needham-Shroeder Public-Key Protocol Using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055, pp. 147–166. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  12. Bellare, M., Rogaway, P.: Provably secure session key distribution– the three party case. In: Proceedings 27th Annual Symposium on the Theory of Computing, pp. 57–66. ACM, New York (1995)

    Google Scholar 

  13. Abadi, M., Rogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). In: Watanabe, O., Hagiya, M., Ito, T., van Leeuwen, J., Mosses, P.D. (eds.) TCS 2000. LNCS, vol. 1872, pp. 3–22. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  14. Gollmann, D.: On the verification of cryptographic protocols — a tale of two committees. In: Proc. of the Workshop on Secure Architectures and Information Flow. ENTCS, vol. 32. Elsevier Science, Amsterdam (2000)

    Google Scholar 

  15. Backes, M., Pfitzmann, B.: Relating symbolic and cryptographic secrecy. In: IEEE Symposium on Security and Privacy (2005)

    Google Scholar 

  16. Bella, G., Bistarelli, S., Massacci, F.: Retaliation: Can we live with flaws? In: Essaidi, M., Thomas, J. (eds.) Proc. of the Nato Advanced Research Workshop on Information Security Assurance and Security. Nato through Science, vol. 6, pp. 3–14. IOS Press, Amsterdam (2006), http://www.iospress.nl/loadtop/load.php?isbn=9781586036782

    Google Scholar 

  17. Dolev, D., Yao, A.: On the Security of Public-Key Protocols. IEEE Transactions on Information Theory 2(29) (1983)

    Google Scholar 

  18. Bella, G., Bistarelli, S.: Confidentiality levels and deliberate/indeliberate protocol attacks. In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds.) Security Protocols 2002. LNCS, vol. 2845, pp. 104–119. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  19. Aiyer, A.S., Alvisi, L., Clement, A., Dahlin, M., Martin, J.P., Porth, C.: Bar fault tolerance for cooperative services. ACM SIGOPS Operating Systems Review 39(5), 45–58 (2005)

    Article  Google Scholar 

  20. Buttyán, L., Hubaux, J.P., Čapkun, S.: A formal model of rational exchange and its application to the analysis of syverson’s protocol. Journal of Computer Security 12(3-4), 551–587 (2004)

    Article  Google Scholar 

  21. Bella, G.: What is Correctness of Security Protocols? Springer Journal of Universal Computer Science 14(12), 2083–2107 (2008)

    Google Scholar 

  22. Armando, A., Compagna, L.: SAT-based Model-Checking for Security Protocols Analysis. International Journal of Information Security 6(1), 3–32 (2007)

    MATH  Google Scholar 

  23. Armando, A., Carbone, R., Compagna, L.: LTL Model Checking for Security Protocols. In: Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSF20), Venice, Italy, July 6-8. LNCS. Springer, Heidelberg (2007)

    Google Scholar 

  24. Neuman, B.C., Ts’o, T.: Kerberos: An authentication service for computer networks, from IEEE communications magazine. In: Stallings, W. (ed.) Practical Cryptography for Data Internetworks, September 1994. IEEE Press, Los Alamitos (1996)

    Google Scholar 

  25. Compagna, L.: SAT-based Model-Checking of Security Protocols. Phd, Università degli Studi di Genova, Italy, and University of Edinburgh, Scotland (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Arsac, W., Bella, G., Chantry, X., Compagna, L. (2009). Validating Security Protocols under the General Attacker. In: Degano, P., Viganò, L. (eds) Foundations and Applications of Security Analysis. ARSPA-WITS 2009. Lecture Notes in Computer Science, vol 5511. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03459-6_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03459-6_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03458-9

  • Online ISBN: 978-3-642-03459-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics