|
| | | |
We wish you a happy and safe holiday season and all the best for 2025
Cross-Layer Verification of Type Flaw Attacks on Security Protocols
Long, B., Fidge, C. and Carrington, D.
Security protocols are often specified at the application layer ; however, application layer specifications give little detail regarding message data structures at the presentation layer upon which some implementation-dependent attacks rely. In this paper we present an approach to verifying security protocols in which both the application and presentation layers are modelled. Using the Group Domain of Interpretation protocol as an example, our application layer specification of the protocol is used as input to the AVISPA model checking tool for analysis. Two type flaw attacks are found via model checking which are then verified against the corresponding presentation layer specification, thus identifying the minimal requirements to prevent the attacks. |
Cite as: Long, B., Fidge, C. and Carrington, D. (2007). Cross-Layer Verification of Type Flaw Attacks on Security Protocols. In Proc. Thirtieth Australasian Computer Science Conference (ACSC2007), Ballarat Australia. CRPIT, 62. Dobbie, G., Ed. ACS. 171-180. |
(from crpit.com)
(local if available)
|
|