Embedding agents within the intruder to detect parallel attacks

  • Authors:
  • P. J. Broadfoot;A. W. Roscoe

  • Affiliations:
  • -;Oxford University Computing Laboratory, Wolfson Building, Parks Road, Oxford OX1 3QD, UK E-mail: {Philippa.Broadfoot, Bill.Roscoe}@comlab.ox.ac.uk

  • Venue:
  • Journal of Computer Security - Special issue on CSFW15
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

We carry forward the work described in our previous papers [5,18,20] on the application of data independence to the model checking of security protocols using CSP [19] and FDR [10]. In particular, we showed how techniques based on data independence [12,19] could be used to justify, by means of a finite FDR check, systems where agents can perform an unbounded number of protocol runs. Whilst this allows for a more complete analysis, there was one significant incompleteness in the results we obtained: while each individual identity could perform an unlimited number of protocol runs sequentially, the degree of parallelism remained bounded (and small to avoid state space explosion). In this paper, we report significant progress towards the solution of this problem, by means anticipated in [5], namely by “internalising” protocol roles within the “intruder” process. The internalisation of protocol roles (initially only server-type roles) was introduced in [20] as a state-space reduction technique (for which it is usually spectacularly successful). It was quickly noticed that this had the beneficial side-effect of making the internalised server arbitrarily parallel, at least in cases where it did not generate any new values of data independent type. We now consider the case where internal roles do introduce fresh values and address the issue of capturing their state of mind (for the purposes of analysis).