2010 International Symposium on Collaborative Technologies and Systems 2010
DOI: 10.1109/cts.2010.5478474
|View full text |Cite
|
Sign up to set email alerts
|

Modelling, verification, and formal analysis of security properties in a P2P system

Abstract: We present a security analysis of the SPREADS 1 system, a distributed storage service based on a centralized peer-topeer architecture. We formally modelled the salient behavior of the actual system using ABCD, a high level specification language with a coloured Petri net semantics, which allowed the execution states of the system to be verified. We verified the behavior of the system in the presence of an external Dolev-Yao attacker, unearthing some replay attacks in the original system. Furthermore, since the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
6
2

Relationship

5
3

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 11 publications
0
10
0
Order By: Relevance
“…We have thus empirically verify our assumption: our methods execute significantly faster and achieve better network and memory use. It is encouraging because we think we can check larger protocols [12] secure P2P exchange of files using truth servers.…”
Section: Resultsmentioning
confidence: 99%
“…We have thus empirically verify our assumption: our methods execute significantly faster and achieve better network and memory use. It is encouraging because we think we can check larger protocols [12] secure P2P exchange of files using truth servers.…”
Section: Resultsmentioning
confidence: 99%
“…One is fully distributed and has been studied in this paper, an earlier version is based on a central MI service and has been considered in [3]. The sensitivity to attacks B and C is an argument in favour of the centralised version.…”
Section: Resultsmentioning
confidence: 99%
“…The system is currently provided to UbiStorage consumers as a box that is ready to plug on the consumer's network and is pre-installed with a Linux system running the peer-to-peer software as well as end-user services. In [3], the security of these protocols has been assessed from a qualitative point of view, resorting to a formal modelling of the protocols combined with automated model-checking of typical scenarios as well as a manual proof. Model-checking allowed to discover potential flaws based on replay attacks, fixes have been proposed and their quality checked again using modelchecking.…”
Section: Introductionmentioning
confidence: 99%
“…Finally, in the security domain, we will consider more complex protocols with branching and looping structures, as well as complex data types manipulations. In particular, we will consider protocols for secure storage distributed through peer-to-peer communication [19] because it is currently model using ABCD and generates large state spaces.…”
Section: Discussionmentioning
confidence: 99%