Modeling and Analyzing Timed Security Protocols Using Extended Timed CSP

Loading...
Thumbnail Image
Authors
Zhang, Xian
Liu, Yang
Auguston, Mikhail
Advisors
Second Readers
Subjects
Date of Issue
2010
Date
Publisher
IEEE
Language
Abstract
Security protocols are hard to design, even under the assumption of perfect cryptography. This is especially true when a protocol involves different timing aspects such as timestamps, timeout, delays and a set of timing constraints. In this paper, we propose a methodology for modeling and analyzing security protocols that are aware of timing aspects. We develop a formalism for modeling security protocols by extending Timed CSP with the capability of stating complicated timing behaviors for processes and events. A reasoning mechanism for the proposed formalism is developed based on Constraint Logic Programming (CLP). Using the reasoning engine built in CLP, the authentication properties of timed security protocols are able to be verified and attacks can be discovered. We demonstrate the capability of our method by modeling and verifying real-world security protocols. New approaches of using timing information to unfold and prevent potential attacks are also presented.
Type
Article
Description
The article of record as published may be found at http://dx.doi.org/10.1109/SSIRI.2010.29
Series/Report No
Department
Computer Science (CS)
Organization
Naval Postgraduate School (U.S.)
Identifiers
NPS Report Number
Sponsors
Funding
Format
10 p.
Citation
Zhang, Xian, Yang Liu, and Mikhail Auguston. "Modeling and analyzing timed security protocols using extended timed csp." Secure Software Integration and Reliability Improvement (SSIRI), 2010 Fourth International Conference on. IEEE, 2010.
Distribution Statement
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Collections