Resource and timing aspects of security protocols

Author:

Aires Urquiza Abraão1,Alturki Musab A.23,Ban Kirigin Tajana4,Kanovich Max56,Nigam Vivek71,Scedrov Andre89,Talcott Carolyn10

Affiliation:

1. Federal University of Paraíba, João Pessoa, Brazil. E-mail: abraauc@gmail.com

2. KFUPM, Dhahran, Saudi Arabia. E-mail: musab@kfupm.edu.sa

3. Runtime Verification Inc., USA

4. Department of Mathematics, University of Rijeka, Rijeka, Croatia. E-mail: bank@math.uniri.hr

5. University College London, London, UK. E-mail: m.kanovich@ucl.ac.uk

6. National Research University Higher School of Economics, Moscow, Russian Federation

7. fortiss, Germany. E-mail: nigam@fortiss.org

8. University of Pennsylvania, Philadelphia, PA, USA. E-mail: scedrov@math.upenn.edu

9. National Research University Higher School of Economics, Moscow, Russian Federation, until July 2020

10. SRI International, Menlo Park, CA, USA. E-mail: clt@csl.sri.com

Abstract

Protocol security verification is one of the best success stories of formal methods. However, some aspects important to protocol security, such as time and resources, are not covered by many formal models. While timing issues involve e.g., network delays and timeouts, resources such as memory, processing power, or network bandwidth are at the root of Denial of Service (DoS) attacks which have been a serious security concern. It is useful in practice and more challenging for formal protocol verification to determine whether a service is vulnerable not only to powerful intruders, but also to resource-bounded intruders that cannot generate or intercept arbitrarily large volumes of traffic. A refined Dolev–Yao intruder model is proposed, that can only consume at most some specified amount of resources in any given time window. Timed protocol theories that specify service resource usage during protocol execution are also proposed. It is shown that the proposed DoS problem is undecidable in general and is PSPACE-complete for the class of resource-bounded, balanced systems. Additionally, we describe a decidable fragment in the verification of the leakage problem for resource-sensitive timed protocol theories.

Publisher

IOS Press

Subject

Computer Networks and Communications,Hardware and Architecture,Safety, Risk, Reliability and Quality,Software

Cited by 7 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. A Flexible Framework for Integrating Maude and SMT Solvers Using Python;Lecture Notes in Computer Science;2024

2. Research on vulnerability mining of authentication protocol based on fuzzy simulation;2023 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB);2023-06-14

3. Incremental Rewriting Modulo SMT;Automated Deduction – CADE 29;2023

4. Detection and diagnosis of deviations in distributed systems of autonomous agents;Mathematical Structures in Computer Science;2022-09-06

5. On the Security and Complexity of Periodic Systems;SN Computer Science;2022-07-02

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3