Cross-layer verification of type flaw attacks on security protocols

  • Authors:
  • Benjamin W. Long;Colin J. Fidge;David A. Carrington

  • Affiliations:
  • The University of Queensland, Brisbane, Australia;Queensland University of Technology, Brisbane, Australia;The University of Queensland, Brisbane, Australia

  • Venue:
  • ACSC '07 Proceedings of the thirtieth Australasian conference on Computer science - Volume 62
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Security protocols are often specified at the application layer; however, application layer specifications give little detail regarding message data structures at the presentation layer upon which some implementation-dependent attacks rely. In this paper we present an approach to verifying security protocols in which both the application and presentation layers are modelled. Using the Group Domain of Interpretation protocol as an example, our application layer specification of the protocol is used as input to the AVISPA model checking tool for analysis. Two type flaw attacks are found via model checking which are then verified against the corresponding presentation layer specification, thus identifying the minimal requirements to prevent the attacks.