A Method for Patching Interleaving-Replay Attacks in Faulty Security Protocols

Juan Carlos Lopez Pimentel, Raul Monroy, Dieter Hutter
2007 Electronical Notes in Theoretical Computer Science  
The verification of security protocols has attracted a lot of interest in the formal methods community, yielding two main verification approaches: i) state exploration, e.g. FDR [8] and OFMC [2]; and ii) theorem proving, e.g. the Isabelle inductive method [12] and Coral [13] . Complementing formal methods, Abadi and Needham's principles aim to guide the design of security protocols in order to make them simple and, hopefully, correct [1]. We are interested in a problem related to verification
more » ... t far less explored: the correction of faulty security protocols. Experience has shown that the analysis of counterexamples or failed proof attempts often holds the key to the completion of proofs and for the correction of a faulty model. In this paper, we introduce a method for patching faulty security protocols that are susceptible to an interleaving-replay attack. Our method makes use of Abadi and Needham's principles for the prudent engineering practice for cryptographic protocols in order to guide the location of the fault in a protocol as well as the proposition of candidate patches. We have run a test on our method with encouraging results. The test set includes 21 faulty security protocols borrowed from the Clark-Jacob library [5] .
doi:10.1016/j.entcs.2006.12.034 fatcat:p4oslnczmrcafoippaufapz4wu