An Intelligent Intruder Model for Security Protocol Analysis (original) (raw)
Abstract
An intelligent intruder model is proposed in this paper. Except for the algebraic abilities to process messages like the Dolev-Yao intruder, it can decide when to generate what terms and whether or not to launch a new session, which principal to choose, and what roles the principal will play based on some strand-added rules. By this heuristic method, we can get a finite state space without the explicit configuration needed by most model checking tools.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
- Anderson, R., Needham, R.: Programming Satan’s computer. In J. van Leeuwen, editor, Computer Science Today: Recent Trends and Developments, LNCS 1000, Springer. (1995) 426–440
Google Scholar - Lowe, G.: An attack on the Needham-Schroeder public key authentication protocol. Information Processing Letter. 56(3) (1995) 131–136
Article MATH Google Scholar - Burrows, M., Abadi, M., Needham, R.: A logic ofauthen tication. Proceedings of the Royal Society of London. (1989) 233–271
Google Scholar - Kindred, D., Wing, J.: Fast, automatic checking of security protocols. In USENIX 2nd Workshop on Electronic Commerce. (1996)
Google Scholar - Clarke, E., Jha, S., Marrero, W.: Using state space exploration and a natural style message derivation engine to verify security protocols. In Proceedings of the IFIP Working Conference on Programming Concepts and Methods. (1998)
Google Scholar - Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR. In T. Margaria, and B. Steffen, editors, Tools and Algorithms for the Constructions and Analysis of Systems. Second International Workshop, TACAS’96, LNCS 1055. (1996) 147–166
Google Scholar - Mitchell, C., Mitchell, M., Stern, U.: Automated analysis ofcryptographic protocols using murö. In Proceedings the 1997 IEEE Symposium on Security and Privacy. IEEE Computer Society Press. (1997)
Google Scholar - Pauson, L.: Proving properties ofsecurit y protocols by induction. In proceedings of the 1997 IEEE Computer Society Symposium on Research in Security and Privacy. (1997) 70–83
Google Scholar - Thayer, F., Herzog, J., Guttman J.: Strand spaces: Why is a security protocol correct? In Proceedings of1998 IEEE Symposium on Security and Privacy. (1998)
Google Scholar - Dolev, D., Yao, A.: On the security ofpublic-key protocols. IEEE Transactions on Information Theory.29 (1983) 198–208
Article MATH MathSciNet Google Scholar - Cervesato, I., Durgin, N., Lincoln, P., Mitchell, J., Scedrov, A.: A meta-notation for protocol analysis. In P. Syverson, editor, Proceedings ofthe 12th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, Mordano, Italy. (1999) 55–69
Google Scholar - Syverson, P., Meadows, C.: Dolev-Yao is no better than Machiavelli. First Workshop on Issues in the Theory of Security — WITS’00, Geneva, Switzerland. (2000) 87–92
Google Scholar - Song, D.: Athena: a new efficient automatic checker for security protocol analysis. In P. Syverson, editor, Proceedings ofthe 12th IEEE Computer Security Foundations Workshop, Mordano, Italy, IEEE Computer Society Press. (1999) 192–202
Google Scholar - Abadi, M., Needham, R.: Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering. 22(1) (1996) 6–15
Article Google Scholar - Clark, J., Jacob, J.: A survey ofauthen tication protocol literature. Available at http://www.cs.york.ac.uk/ jac.
- Mitchell, J., Shmatikov, V., Stern, V.: Finite-state analysis of SSL 3.0. In Seventh USENIX Security Symposium. (1998) 201–216
Google Scholar
Author information
Authors and Affiliations
- Shanghai Jiaotong University, 200030, Shanghai, China
Dongxi Liu, Xiaoyong Li & Yingcai Bai
Authors
- Dongxi Liu
- Xiaoyong Li
- Yingcai Bai
Editor information
Editors and Affiliations
- Engineering Research Center for Information Security Technology (ERCIST), Chinese Academy of Sciences, P.O. Box 8718, 100080, Beijing, China
Sihan Qing - NTT Labs, 1-1 Hikarinooka, 239-0847, Yokosuka-shi, Japan
Tatsuaki Okamoto - Oracle Corporation, 500 Oracle Parkway, 94065, Redwood Shores, CA, USA
Jianying Zhou
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, D., Li, X., Bai, Y. (2001). An Intelligent Intruder Model for Security Protocol Analysis. In: Qing, S., Okamoto, T., Zhou, J. (eds) Information and Communications Security. ICICS 2001. Lecture Notes in Computer Science, vol 2229. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45600-7\_2
Download citation
- .RIS
- .ENW
- .BIB
- DOI: https://doi.org/10.1007/3-540-45600-7\_2
- Published: 24 October 2001
- Publisher Name: Springer, Berlin, Heidelberg
- Print ISBN: 978-3-540-42880-0
- Online ISBN: 978-3-540-45600-1
- eBook Packages: Springer Book Archive
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.