论文标题

随时间分析

Protocol Analysis with Time

论文作者

Aparicio-Sánchez, Damián, Escobar, Santiago, Meadows, Catherine, Meseguer, Jose, Sapiña, Julia

论文摘要

我们提出了一个适合分析加密协议的框架,这些框架在执行中使用时间。我们提供了一个过程代数语法,该过程可以使流程可用的时间信息,以及一个考虑到时间的基本属性的过渡语义。如果需要,用户可以添加其他属性。该定时协议框架可以作为仿真工具或符号分析工具实现,在该工具中,时间引用由逻辑变量表示,并且时间的属性被作为对这些时间逻辑变量的约束实现。这些约束沿协议的符号执行携带。随着分析的进行,可以评估这些约束的满意度,因此违反物理定律的攻击可以被拒绝是不可能的。我们通过使用Maude-NPA协议分析仪以及用于评估正时限制的满足性的SMT求解器,证明了方法的可行性。我们提供了从定时过程代数到Maude-NPA语法和语义的声音和完整的协议转换,我们证明了它的健全性和完整性。然后,我们使用该工具来分析黑手党欺诈和远程劫持的攻击,对距离距离的协议套件。

We present a framework suited to the analysis of cryptographic protocols that make use of time in their execution. We provide a process algebra syntax that makes time information available to processes, and a transition semantics that takes account of fundamental properties of time. Additional properties can be added by the user if desirable. This timed protocol framework can be implemented either as a simulation tool or as a symbolic analysis tool in which time references are represented by logical variables, and in which the properties of time are implemented as constraints on those time logical variables. These constraints are carried along the symbolic execution of the protocol. The satisfiability of these constraints can be evaluated as the analysis proceeds, so attacks that violate the laws of physics can be rejected as impossible. We demonstrate the feasibility of our approach by using the Maude-NPA protocol analyzer together with an SMT solver that is used to evaluate the satisfiability of timing constraints. We provide a sound and complete protocol transformation from our timed process algebra to the Maude-NPA syntax and semantics, and we prove its soundness and completeness. We then use the tool to analyze Mafia fraud and distance hijacking attacks on a suite of distance-bounding protocols.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源