2018
DOI: 10.18178/jacn.2018.6.2.258
|View full text |Cite
|
Sign up to set email alerts
|

Automated Logic-Based Technique for Formal Verification of Security Protocols

Abstract:  Abstract-The design of secure protocols is complex and prone to error. Formal verification is an imperative step in the design of security protocols and provides a rigid and thorough means of evaluating the correctness of security protocols. This paper discusses the process of formal verification using a logic-based technique for detecting protocol weaknesses that are exploitable by freshness and interleaving attacks. This technique is realised as a special purpose logic for attack detection that can be used… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…Moreover, the design of such protocols should be robust enough to resist attacks [70,71,74] and must be tested for their functional correctness (i.e. application of formal method) before they are used in practice [69,86].…”
Section: Vulnerabilities In Iot Systemsmentioning
confidence: 99%
“…Moreover, the design of such protocols should be robust enough to resist attacks [70,71,74] and must be tested for their functional correctness (i.e. application of formal method) before they are used in practice [69,86].…”
Section: Vulnerabilities In Iot Systemsmentioning
confidence: 99%
“…However, a public network such as the Internet should be treated as an insecure network, where a malicious adversary can eavesdrop, intercept and modify messages. Thus, cryptographic protocols are required to ensure the security of both the infrastructure itself and the information that runs through it [1,2]. Basic security protocols allow agents to authenticate each other, to establish fresh session keys for confidential communication and to ensure the authenticity of data and services.…”
Section: Introductionmentioning
confidence: 99%
“…For example, $350M and $70M are the size of loss caused by Yahoo and Bitcoin data breach, respectively [1]. The intruder techniques have been evolved using sophisticated tools to create attacks, exploiting vulnerabilities in server protocols [2], [3].…”
Section: Introductionmentioning
confidence: 99%