Filters








898 Hits in 3.0 sec

An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols

Alessandro Armando, Luca Compagna
2005 Electronical Notes in Theoretical Computer Science  
In previous work we showed that automatic SAT-based model-checking techniques based on a reduction of protocol (in)security problems to a sequence of propositional satisfiability problems can be used to  ...  In this paper we present an optimized intruder model that may lead in many cases to shorter attacks which can be detected in our framework by generating smaller propositional formulae.  ...  Acknowledgments We are grateful to Cristina Frà for her contribution to the implementation of the encodings for supporting such an optimized intruder.  ... 
doi:10.1016/j.entcs.2004.05.021 fatcat:gxgc5bvp35an7pjj3pmx5cwluy

Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning [chapter]

Alessandro Armando, Luca Compagna
2002 Lecture Notes in Computer Science  
We describe a model-checker for security protocols based on our ideas and show that attacks to a set of well-known authentication protocols are quickly found by state-of-the-art SAT solvers.  ...  Our approach results from the combination of a reduction of protocol insecurity problems to planning problems and well-known SAT-reduction techniques developed for planning.  ...  Implementation and Computer Experiments We have implemented the above ideas in SATMC, a SAT-based Model-Checker for security protocol analysis.  ... 
doi:10.1007/3-540-36135-9_14 fatcat:6uh5hj4ufbaetexxkn3dlt22yi

SATMC: A SAT-Based Model Checker for Security-Critical Systems [chapter]

Alessandro Armando, Roberto Carbone, Luca Compagna
2014 Lecture Notes in Computer Science  
We present SATMC 3.0, a SAT-based bounded model checker for security-critical systems that stems from a successful combination of encoding techniques originally developed for planning with techniques developed  ...  attack on the SAML-based Single Sign-On (SSO) for Google Apps, an authentication flaw in the SAML 2.0 Web Browser SSO Profile, and a number of attacks on PKCS#11 Security Tokens.  ...  We are grateful to Luca Zanetti for his contribution in the design and implementation of the Goal Grounding and PLTL2SAT modules.  ... 
doi:10.1007/978-3-642-54862-8_3 fatcat:i6nk3wdmrveclbp3tzac3cqohq

Automated Security Protocol Analysis With the AVISPA Tool

Luca Viganò
2006 Electronical Notes in Theoretical Computer Science  
The AVISPA Tool is a push-button tool for the Automated Validation of Internet Security Protocols and Applications.  ...  Experimental results, carried out on a large library of Internet security protocols, indicate that the AVISPA Tool is a state-of-the-art tool for Internet security protocol analysis as, to our knowledge  ...  Model-Checker OFMC, the Constraint-Logic-based Attack Searcher CL-AtSe, the SAT-based Model-Checker SATMC, and the TA4SP protocol analyzer, which verifies protocols by implementing tree automata based  ... 
doi:10.1016/j.entcs.2005.11.052 fatcat:es3r56p4wrdndckiybqwf7dez4

Comparing State Spaces in Automatic Security Protocol Analysis [chapter]

Cas J. F. Cremers, Pascal Lafourcade, Philippe Nadeau
2009 Lecture Notes in Computer Science  
There are several automatic tools available for the symbolic analysis of security protocols. The models underlying these tools differ in many aspects.  ...  We apply our study of state space relations in a performance comparison of several well-known automatic tools for security protocol analysis.  ...  Acknowledgements: We would like to thank the authors of several of the tools used in these tests for their helpful personal communications.  ... 
doi:10.1007/978-3-642-02002-5_5 fatcat:u5y43yopfvhd3mligaxhllxrbq

Formal Analysis of ISO/IEC 9798-2 Authentication Standard Using AVISPA

Sheikh Ziauddin, Bruno Martin
2013 2013 Eighth Asia Joint Conference on Information Security  
Use of formal methods is considered as a useful and efficient technique for the validation of security properties of the protocols.  ...  In this paper, we analyze the protocols of ISO/IEC 9798-2 entity authentication standard using a state-ofthe-art tool for automated analysis named AVISPA.  ...  SATMC (SAT-based Model Checker) performs protocol falsification and bounded verification for only typed protocol model.  ... 
doi:10.1109/asiajcis.2013.25 dblp:conf/asiajcis/ZiauddinM13 fatcat:sl3skc2bfrbvvlmvbtg6cyqruu

Automated Verification of Equivalence Properties of Cryptographic Protocols

Rohit Chadha, Vincent Cheval, Ştefan Ciobâcă, Steve Kremer
2016 ACM Transactions on Computational Logic  
The procedure can handle a large set of cryptographic primitives, namely those which can be modeled by an optimally reducing convergent rewrite system.  ...  We present a novel procedure to verify equivalence properties for bounded number of sessions. Our procedure is able to verify trace equivalence for determinate cryptographic protocols.  ...  Conclusion and future work We present a novel Horn-clause resolution based procedure for verifying equivalence properties for a bounded number of sessions of cryptographic protocols.  ... 
doi:10.1145/2926715 fatcat:ojjokeb3sfgf3pcdohvlgqwr2y

Automated Verification of Equivalence Properties of Cryptographic Protocols [chapter]

Rohit Chadha, Ştefan Ciobâcă, Steve Kremer
2012 Lecture Notes in Computer Science  
The procedure can handle a large set of cryptographic primitives, namely those which can be modeled by an optimally reducing convergent rewrite system.  ...  We present a novel procedure to verify equivalence properties for bounded number of sessions. Our procedure is able to verify trace equivalence for determinate cryptographic protocols.  ...  Conclusion and future work We present a novel Horn-clause resolution based procedure for verifying equivalence properties for a bounded number of sessions of cryptographic protocols.  ... 
doi:10.1007/978-3-642-28869-2_6 fatcat:iwpss5zxrveofa2nvde7p5pbee

Automated verification of virtualized infrastructures

Sören Bleikertz, Thomas Groß, Sebastian Mödersheim
2011 Proceedings of the 3rd ACM workshop on Cloud computing security workshop - CCSW '11  
The combination of a complex topology and changes to it by an intruder is a problem that lies beyond the scope of previous analysis tools and to which we can give first positive verification results.  ...  The different verification tools range from model checking to theorem proving; this allows us to exploit the complementary strengths of methods, and also to understand how to best represent the analysis  ...  We thank Piotr Filipiuk for support on the SuccintSolver.  ... 
doi:10.1145/2046660.2046672 dblp:conf/ccs/BleikertzGM11 fatcat:fwo2gkviqrh5hevhigd74g2aye

Automatic verification of secrecy properties for linear logic specifications of cryptographic protocols

Marco Bozzano, Giorgio Delzanno
2004 Journal of symbolic computation  
intruder model.  ...  Unlike traditional approaches based on model checking, we can reason about parametric, infinite-state systems; thus we do not pose any limitation on the number of parallel runs of a protocol.  ...  Acknowledgements We would like to thank the anonymous reviewers of this paper for their helpful suggestions and advice.  ... 
doi:10.1016/j.jsc.2004.04.002 fatcat:sjmicevacfcr7orbzcxll7qdhi

An Authentication Protocol Based on Combined RFID-Biometric System

Noureddine Chikouche, Foudil Cherif, Mohamed Benmohammed
2012 International Journal of Advanced Computer Science and Applications  
For Security analysis of protocol proposed, we will use AVISPA and SPAN tools to verify the authentication and the secrecy.  ...  Our protocol requires a PRNG (Pseud-Random Number Generator), a robust hash function and Biometric hash function. The Biometric hash function is used to optimize and to protect biometric data.  ...  various techniques of validation (Model-checking, automate trees, resolution of constraints, Solver SAT).  ... 
doi:10.14569/ijacsa.2012.030411 fatcat:h4v5oykig5dr5mgp265nm7u5am

AVR: Abstractly Verifying Reachability [chapter]

Aman Goel, Karem Sakallah
2020 Lecture Notes in Computer Science  
We present AVR, a push-button model checker for verifying state transition systems directly at the source-code level.  ...  AVR uses information embedded in the word-level syntax of the design representation to automatically perform scalable model checking by combining a novel syntax-guided abstraction-refinement technique  ...  -Bounded model checking (BMC) [15] allows for an alternative to the IC3+SA engine for quick bug hunting, especially for shallow bugs.  ... 
doi:10.1007/978-3-030-45190-5_23 fatcat:xk7elqf3zbcfdgftw7qedb4dtu

Deciding Security for Protocols with Recursive Tests [chapter]

Mathilde Arnaud, Véronique Cortier, Stéphanie Delaune
2011 Lecture Notes in Computer Science  
Formal methods have shown their usefulness for providing a careful security analysis in the case of standard authentication and confidentiality protocols.  ...  We provide NPTIME decision procedures for protocols with recursive tests and for a bounded number of sessions.  ...  [11, 18] ) in modeling security protocols.  ... 
doi:10.1007/978-3-642-22438-6_6 fatcat:xrudx3vc4reqndhoemawkd37va

Chosen-name Attacks: An Overlooked Class of Type-flaw Attacks

Pieter Ceelen, Sjouke Mauw, Saša Radomirović
2008 Electronical Notes in Theoretical Computer Science  
In the context of Dolev-Yao style analysis of security protocols, we consider the capability of an intruder to dynamically choose and assign names to agents.  ...  Several examples of protocols that are vulnerable to this type of attack are given, including Lowe's modification of KSL. The consequences for automatic verification tools are discussed.  ...  Acknowledgement We thank Cas Cremers, David Basin, Kristian Gjøsteen, and Suzana Andova for discussions and helpful comments.  ... 
doi:10.1016/j.entcs.2007.12.015 fatcat:qc7tfikz5retdix4gnaxwnlmqq

The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures [chapter]

Alessandro Armando, Wihem Arsac, Tigran Avanesov, Michele Barletta, Alberto Calvi, Alessandro Cappai, Roberto Carbone, Yannick Chevalier, Luca Compagna, Jorge Cuéllar, Gabriel Erzse, Simone Frau (+10 others)
2012 Lecture Notes in Computer Science  
The AVANTSSAR Platform is an integrated toolset for the formal specification and automated validation of trust and security of service-oriented architectures and other applications in the Internet of Services  ...  These include, most notably, a serious flaw in the SAML-based Single Sign-On for Google Apps (now corrected by Google as a result of our findings).  ...  The SAT-based Model Checker is an open, flexible platform for SATbased bounded model checking of security services.  ... 
doi:10.1007/978-3-642-28756-5_19 fatcat:n7ktur2bdbaireqbiu42k4bqzq
« Previous Showing results 1 — 15 out of 898 results