메뉴 건너뛰기




Volumn 4, Issue 2, 2011, Pages 147-161

Synthesis of attack actions using model checking for the verification of security protocols

Author keywords

Cryptographic protocols; Intruder modeling; Model checking

Indexed keywords

CRYPTOGRAPHY; DENIAL-OF-SERVICE ATTACK; NETWORK SECURITY;

EID: 79251535326     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.119     Document Type: Article
Times cited : (10)

References (37)
  • 2
    • 38349029320 scopus 로고    scopus 로고
    • Intrusion attack tactics for the model checking of e-commerce security guarantees. In Proceedings of the 26th International Conference on Computer Safety, Reliability and Security (SAFECOMP), Nuremberg, Germany, LNCS 4680, Springer Verlag, -.
    • Basagiannis S, Katsaros P, Pombortsis A. Intrusion attack tactics for the model checking of e-commerce security guarantees. In Proceedings of the 26th International Conference on Computer Safety, Reliability and Security (SAFECOMP), Nuremberg, Germany, LNCS 4680, Springer Verlag, 2007; 238-251
    • (2007) , pp. 238-251
    • Basagiannis, S.1    Katsaros, P.2    Pombortsis, A.3
  • 3
    • 84947611601 scopus 로고    scopus 로고
    • The Spin Model Checker: Primer and Reference Manual Addison-Wesley, ISBN 0-321-22862-6.
    • The Spin Model Checker: Primer and Reference Manual Addison-Wesley, ISBN 0-321-22862-6.
  • 4
    • 84947618949 scopus 로고    scopus 로고
    • The SPIN model checker official website, available at (last accessed 12/12/2008).
    • The SPIN model checker official website, available at (last accessed 12/12/2008).
  • 5
    • 0027701529 scopus 로고
    • A methodology for improving computer access security
    • Obaidat MS. A methodology for improving computer access security. Computers & Security 1993; 12: 657-662.
    • (1993) Computers & Security , vol.12 , pp. 657-662
    • Obaidat, M.S.1
  • 6
    • 0003988659 scopus 로고    scopus 로고
    • The Theory and Practice of Concurrency
    • Prentice Hall: Upper Saddle River NJ, USA.
    • Roscoe AW. The Theory and Practice of Concurrency. Prentice Hall: Upper Saddle River NJ, USA, 1998.
    • (1998)
    • Roscoe, A.W.1
  • 7
    • 79251583622 scopus 로고    scopus 로고
    • A design of optimal key management scheme for secure and survivable wireless sensor networks
    • Yi Qian, Kejie Lu, Bo Rong, Tipper D. A design of optimal key management scheme for secure and survivable wireless sensor networks. Security and Communication Networks 2008; 1(1): 75-82.
    • (2008) Security and Communication Networks , vol.1 , Issue.1 , pp. 75-82
    • Yi, Q.1    Kejie, L.2    Bo, R.3    Tipper, D.4
  • 8
    • 0036836682 scopus 로고    scopus 로고
    • An intensive survey of fair non-repudiation protocols
    • Kremer S, Markowitch O, Zhou J. An intensive survey of fair non-repudiation protocols. Computer Communications 2002; 25(17): 1606-1621.
    • (2002) Computer Communications , vol.25 , Issue.17 , pp. 1606-1621
    • Kremer, S.1    Markowitch, O.2    Zhou, J.3
  • 9
    • 0003406298 scopus 로고
    • Design and Validation of Computer Protocols
    • Prentice-Hall: Upper Saddle River, NJ, USA.
    • Holzmann GJ. Design and Validation of Computer Protocols. Prentice-Hall: Upper Saddle River, NJ, USA, 1991.
    • (1991)
    • Holzmann, G.J.1
  • 10
    • 26644436729 scopus 로고    scopus 로고
    • Computer and network security risk management: theory, challenges, and countermeasures
    • Hamdi M, Boudriga N. Computer and network security risk management: theory, challenges, and countermeasures. International Journal of Communication Systems 2005; 18(8): 763-793.
    • (2005) International Journal of Communication Systems , vol.18 , Issue.8 , pp. 763-793
    • Hamdi, M.1    Boudriga, N.2
  • 11
    • 84955602379 scopus 로고
    • Formal verification of cryptographic protocols: a survey. Advances in Cryptology-International Conference on the Theory and Application of Cryptology (ASIACRYPT), LNCS 917, Springer-Verlag.
    • Meadows CA. Formal verification of cryptographic protocols: a survey. Advances in Cryptology-International Conference on the Theory and Application of Cryptology (ASIACRYPT), LNCS 917, Springer-Verlag, 1995; 133-150.
    • (1995) , pp. 133-150
    • Meadows, C.A.1
  • 12
    • 33750936222 scopus 로고    scopus 로고
    • Feasibility of multi-protocol attacks. In Proceedings of the First International Conference on Availability, Reliability and Security, IEEE Computer Society Press.
    • Cremers CJF. Feasibility of multi-protocol attacks. In Proceedings of the First International Conference on Availability, Reliability and Security, IEEE Computer Society Press, 2006.
    • (2006)
    • Cremers, C.J.F.1
  • 13
    • 51949118177 scopus 로고    scopus 로고
    • A probabilistic attacker model for quantitative verification of DoS security threats. In Proceedings of the 32nd Annual International Computer and Applications Software (COMPSAC), Turku, Finland.
    • Basagiannis S, Katsaros P, Pombortsis A, Alexiou N. A probabilistic attacker model for quantitative verification of DoS security threats. In Proceedings of the 32nd Annual International Computer and Applications Software (COMPSAC), Turku, Finland, 2008.
    • (2008)
    • Basagiannis, S.1    Katsaros, P.2    Pombortsis, A.3    Alexiou, N.4
  • 14
    • 79251552463 scopus 로고    scopus 로고
    • Host Identity Protocol. Internet Engineering Task Force, RFC5201.
    • Moskowitz R, Nikander P, Jokela P, Henderson T. Host Identity Protocol. Internet Engineering Task Force, 2008; RFC5201.
    • (2008)
    • Moskowitz, R.1    Nikander, P.2    Jokela, P.3    Henderson, T.4
  • 15
    • 84979076059 scopus 로고    scopus 로고
    • Payword and Micromint: two simple micropayment schemes. In Proceedings of the Fourth International Workshop on Security Protocols, LNCS 1189, Springer-Verlag, -
    • Rivest RL, Shamir A. Payword and Micromint: two simple micropayment schemes. In Proceedings of the Fourth International Workshop on Security Protocols, LNCS 1189, Springer-Verlag, 1996; 69-87.
    • (1996) , pp. 69-87
    • Rivest, R.L.1    Shamir, A.2
  • 18
    • 0030705405 scopus 로고    scopus 로고
    • Automated analysis of cryptographic protocols using Murφ, In Proceedings of the IEEE Symposium on Research in Security and Privacy, IEEE Computer Society, -
    • Mitchell JC, Mitchell M, Stern U. Automated analysis of cryptographic protocols using Murφ, In Proceedings of the IEEE Symposium on Research in Security and Privacy, IEEE Computer Society, 1997; 141-153.
    • (1997) , pp. 141-153
    • Mitchell, J.C.1    Mitchell, M.2    Stern, U.3
  • 19
    • 0029484376 scopus 로고
    • Modeling and verifying key-exchange protocols using CSP and FDR, In Proceedings of the 8th IEEE Computer Security Foundations Workshop, IEEE Computer Society, -
    • Roscoe AW. Modeling and verifying key-exchange protocols using CSP and FDR, In Proceedings of the 8th IEEE Computer Security Foundations Workshop, IEEE Computer Society, 1995; 98-107.
    • (1995) , pp. 98-107
    • Roscoe, A.W.1
  • 20
    • 0027205880 scopus 로고
    • A semantic model for authentication protocols. In Proceedings of the IEEE Symposium on Research in Security and Privacy.
    • Woo TYC, Lam SS. A semantic model for authentication protocols. In Proceedings of the IEEE Symposium on Research in Security and Privacy, 1993.
    • (1993)
    • Woo, T.Y.C.1    Lam, S.S.2
  • 21
    • 0037076869 scopus 로고    scopus 로고
    • Finite-state analysis of two contract signing protocols
    • Shmatikov V, Mitchell JC. Finite-state analysis of two contract signing protocols. Theoretical Computer Science 2002; 283: 419-450.
    • (2002) Theoretical Computer Science , vol.283 , pp. 419-450
    • Shmatikov, V.1    Mitchell, J.C.2
  • 23
    • 0025405980 scopus 로고
    • A critique of the Burrows, Abadi and Needham logic
    • Nessett Dan M. A critique of the Burrows, Abadi and Needham logic. ACMSIGOPS Operating Systems Review 1990; 24(2): 35-38.
    • (1990) ACMSIGOPS Operating Systems Review , vol.24 , Issue.2 , pp. 35-38
    • Nessett, D.M.1
  • 25
    • 0030678388 scopus 로고    scopus 로고
    • Casper: a compiler for the analysis of security protocols. In Proceedings of the IEEE Computer Security Foundations Workshop, IEEE Computer Society, -
    • Lowe G. Casper: a compiler for the analysis of security protocols. In Proceedings of the IEEE Computer Security Foundations Workshop, IEEE Computer Society, 1997; 18-30.
    • (1997) , pp. 18-30
    • Lowe, G.1
  • 26
    • 0028385109 scopus 로고
    • Three systems for cryptographic protocol analysis
    • Meadows C, Kemmerer R, Millen J. Three systems for cryptographic protocol analysis. Journal of Cryptology 1994; 7(2): 79-130.
    • (1994) Journal of Cryptology , vol.7 , Issue.2 , pp. 79-130
    • Meadows, C.1    Kemmerer, R.2    Millen, J.3
  • 27
    • 0032623470 scopus 로고    scopus 로고
    • Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification
    • Gritzalis S, Spinellis D, Georgiadis P. Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification. Computer Communications 1999; 22: 697-709.
    • (1999) Computer Communications , vol.22 , pp. 697-709
    • Gritzalis, S.1    Spinellis, D.2    Georgiadis, P.3
  • 28
    • 79251563337 scopus 로고    scopus 로고
    • AVISPA: automated validation of Internet security protocols and applications, FET Open Project IST-2001-3925 2.
    • AVISPA: automated validation of Internet security protocols and applications, 2003. FET Open Project IST-2001-3925 2
    • (2003)
  • 29
    • 34547372939 scopus 로고    scopus 로고
    • An intruder model for verifying liveness in security protocols. In Proceedings of the fourth ACM workshop on Formal Methods in Security (FMSE '06), Alexandria, Virginia, USA, -.
    • Cederquist JG, Dashti MT. An intruder model for verifying liveness in security protocols. In Proceedings of the fourth ACM workshop on Formal Methods in Security (FMSE '06), Alexandria, Virginia, USA, 2006; 23-32
    • (2006) , pp. 23-32
    • Cederquist, J.G.1    Dashti, M.T.2
  • 30
    • 0031634547 scopus 로고    scopus 로고
    • Towards a completeness result for model-checking of Security Protocols, In Proceedings of the 11th Computer Security Foundations Workshop. IEEE Computer Society Press.
    • Lowe G. Towards a completeness result for model-checking of Security Protocols, In Proceedings of the 11th Computer Security Foundations Workshop. IEEE Computer Society Press, 1998.
    • (1998)
    • Lowe, G.1
  • 31
    • 79251590434 scopus 로고    scopus 로고
    • The perfect spy for model-checking cryptoprotocols, In Proceedings of the Workshop on Design and Formal Verification of Security Protocols (DIMACS).
    • Roscoe AW, Goldsmith M. The perfect spy for model-checking cryptoprotocols, In Proceedings of the Workshop on Design and Formal Verification of Security Protocols (DIMACS), 1997.
    • (1997)
    • Roscoe, A.W.1    Goldsmith, M.2
  • 32
    • 79251554258 scopus 로고    scopus 로고
    • A survey of authentication protocol literature: version 1.0, Technical Report, University of York.
    • Clark J, Jacob J. A survey of authentication protocol literature: version 1.0, Technical Report, University of York, 1997.
    • (1997)
    • Clark, J.1    Jacob, J.2
  • 33
    • 0033683193 scopus 로고    scopus 로고
    • How to prevent type flaw attacks on security protocols, In Proceedings of the 13th IEEE Computer Security Foundations Workshop, IEEE Computer Society, -
    • Heather J, Lowe G, Schneider S. How to prevent type flaw attacks on security protocols, In Proceedings of the 13th IEEE Computer Security Foundations Workshop, IEEE Computer Society, 2000; 255-268.
    • (2000) , pp. 255-268
    • Heather, J.1    Lowe, G.2    Schneider, S.3
  • 34
    • 85063324360 scopus 로고
    • Cryptographic protocol flaws-Know your enemy, In Proceedings of the 7th IEEE Computer Security Foundations Workshop, IEEE Computer Society, -
    • Carlsen U. Cryptographic protocol flaws-Know your enemy, In Proceedings of the 7th IEEE Computer Security Foundations Workshop, IEEE Computer Society, 1994; 192-200.
    • (1994) , pp. 192-200
    • Carlsen, U.1
  • 35
    • 84962060059 scopus 로고    scopus 로고
    • The logic of authentication protocols. In Proceedings of the 1st International School on Foundations of Security Analysis and Design (FOSAD 2000) LNCS 2171, Springer-Verlag, 2001.
    • Syverson P, Cervesato I. The logic of authentication protocols. In Proceedings of the 1st International School on Foundations of Security Analysis and Design (FOSAD 2000) LNCS 2171, Springer-Verlag, 2001, 63-137.
    • Syverson, P.1    Cervesato, I.2
  • 36
    • 79251563650 scopus 로고    scopus 로고
    • Using selective, short-term memory to improve resilience against DDoS exhaustion attacks
    • Liao Q, Cieslak DA, Striegel AD, Chawla NV. Using selective, short-term memory to improve resilience against DDoS exhaustion attacks. Security and Communication Networks. 2008; 1(4): 287-299.
    • (2008) Security and Communication Networks. , vol.1 , Issue.4 , pp. 287-299
    • Liao, Q.1    Cieslak, D.A.2    Striegel, A.D.3    Chawla, N.V.4
  • 37
    • 79251578206 scopus 로고
    • The MD5 Message-Digest Algorithm, Internet informational RFC 1321.
    • Rivest RL. The MD5 Message-Digest Algorithm, Internet informational RFC 1321, 1992.
    • (1992)
    • Rivest, R.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.