Tenth Asia-Pacific Software Engineering Conference, 2003.
DOI: 10.1109/apsec.2003.1254397
|View full text |Cite
|
Sign up to set email alerts
|

Formal verification of type flaw attacks in security protocols

Abstract: Security protocols are often modelled at a high level of abstraction, potentially overlooking implementationdependent vulnerabilities. Here we use the Z specification language's rich set of data structures to formally model potentially ambiguous messages that may be exploited in a 'type flaw' attack. We then show how to formally verify whether or not such an attack is actually possible in a particular protocol using Z's schema calculus.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…These attacks emerge when tags are confused with terms or when parts of a term are confused with another term. The detection of complex type flaws is formalized in [23,24,18,19]. Research in this area focuses on the transitions from abstract message specification into concrete bit strings and vice versa.…”
Section: Related Workmentioning
confidence: 99%
“…These attacks emerge when tags are confused with terms or when parts of a term are confused with another term. The detection of complex type flaws is formalized in [23,24,18,19]. Research in this area focuses on the transitions from abstract message specification into concrete bit strings and vice versa.…”
Section: Related Workmentioning
confidence: 99%
“…Key Management Architecture for Hierarchical Group Protocols has been verified using AVISPA tool in [20]. Also the Cross-Layer Verification of Type Flaw Attacks on Security Protocols was detected as in [21].…”
Section: Protocols Verified By Using Avispamentioning
confidence: 99%