Improving Automatic Verification of Security Protocols with XOR

  • Authors:
  • Xihui Chen;Ton Deursen;Jun Pang

  • Affiliations:
  • Faculty of Sciences, Technology and Communication, University of Luxembourg, Luxembourg L-1359 and School of Computer Science and Technology, Shandong University, Jinan, China 250101;Faculty of Sciences, Technology and Communication, University of Luxembourg, Luxembourg L-1359;Faculty of Sciences, Technology and Communication, University of Luxembourg, Luxembourg L-1359

  • Venue:
  • ICFEM '09 Proceedings of the 11th International Conference on Formal Engineering Methods: Formal Methods and Software Engineering
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Küsters and Truderung recently proposed an automatic verification method for security protocols with exclusive or (XOR). Their method reduces protocols with XOR to their XOR-free equivalents, enabling efficient verification by tools such as ProVerif. Although the proposed method works efficiently for verifying secrecy, verification of authentication properties is inefficient and sometimes impossible. In this paper, we improve the work by Küsters and Truderung in two ways. First, we extend their method for authentication verification to a richer class of XOR-protocols by automatically introducing bounded verification. Second, we improve the efficiency of their approach by developing a number of dedicated optimizations. We show the applicability of our work by implementing a prototype and applying it to both existing benchmarks and RFID protocols. The experiments show promising results and uncover a flaw in a recently proposed RFID protocol.