Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol

  • Authors:
  • Wei Wang;Dongyao Ji

  • Affiliations:
  • The State Key Laboratory of Information Security, Graduate University of Chinese Academy of Science, Beijing, P.R. China 100049;The State Key Laboratory of Information Security, Graduate University of Chinese Academy of Science, Beijing, P.R. China 100049

  • Venue:
  • FORTE '08 Proceedings of the 28th IFIP WG 6.1 international conference on Formal Techniques for Networked and Distributed Systems
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we use SPIN, a model checker for LTL, to detect vulnerabilities in the AACS drive-host authentication protocol. Before the detection, we propose a variant of the Dolev-Yao attacker model [4] and incorporate the synthesis and analysis rules [7] to formalize the protocol and the intruder capabilities. During the detection, we check the authenticity of the protocol and identify a few weaknesses. Besides, we propose a novel collusion attack that seriously threaten the security of the protocol, and build a corresponding LTL formula. Based on the formula, SPIN detects a few relevant attack instances in the original scheme of the authentication protocol and a modified scheme advanced in [5].