An approach to analyzing availability properties of security protocols

  • Authors:
  • Henrik Pilegaard;Michael R. Hansen;Robin Sharp

  • Affiliations:
  • Informatics and Mathematical Modelling, Technical University of Denmark, DK-2800 Kongens Lyngby, Denmark;Informatics and Mathematical Modelling, Technical University of Denmark, DK-2800 Kongens Lyngby, Denmark;Informatics and Mathematical Modelling, Technical University of Denmark, DK-2800 Kongens Lyngby, Denmark

  • Venue:
  • Nordic Journal of Computing
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

Meadows has shown how availability issues involving security protocols may be treated by analyzing the time-consuming internal actions of agents with respect to failstop criteria that are cost dependent.In this paper we present a technique which combines Paulson's inductive approach to protocol analysis with Interval Logic in order to create a verification tool that supports analysis of the kind Meadows proposes.Based on a novel notion of packets and a redefined notion of external events we develop theoretical extensions that enable the inductive analysis method to distinguish active attacks . To supplement the global traces of external events we define an inductive theory of (untimed) local traces of internal actions. Notions of timed global traces and timed local traces are introduced and used to develop a method that allows natural modelling of real-time (cost) properties of security protocols.Proof support for the theory developed here is achieved via encoding in Isabelle/ LSILHOL, an Isabelle/HOL environment for (labelled) interval logics. Some small examples of protocols are treated and properties are shown via interactive theorem proving.