TAuth: Verifying timed security protocols

Quantitative timing is often relevant to the security of systems, like web applications, cyber-physical systems, etc. Verifying timed security protocols is however challenging as both arbitrary attacking behaviors and quantitative timing may lead to undecidability. In this work, we develop a service...

Full description

Saved in:
Bibliographic Details
Main Authors: LI, Li, SUN, Jun, LIU, Yang, DONG, Jin Song
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2014
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/4987
https://ink.library.smu.edu.sg/context/sis_research/article/5990/viewcontent/tauth.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-5990
record_format dspace
spelling sg-smu-ink.sis_research-59902020-03-12T09:44:29Z TAuth: Verifying timed security protocols LI, Li SUN, Jun LIU, Yang DONG, Jin Song Quantitative timing is often relevant to the security of systems, like web applications, cyber-physical systems, etc. Verifying timed security protocols is however challenging as both arbitrary attacking behaviors and quantitative timing may lead to undecidability. In this work, we develop a service framework to support intuitive modeling of the timed protocol, as well as automatic verification with an unbounded number of sessions. The partial soundness and completeness of our verification algorithms are formally defined and proved. We implement our method into a tool called TAuth and the experiment results show that our approach is efficient and effective in both finding security flaws and giving proofs. 2014-05-11T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/4987 info:doi/10.1007/978-3-319-11737-9_20 https://ink.library.smu.edu.sg/context/sis_research/article/5990/viewcontent/tauth.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University False Alarm Timing Constraint Service Composition Service Basis Authentication Protocol Software Engineering
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic False Alarm
Timing Constraint
Service Composition
Service Basis
Authentication Protocol
Software Engineering
spellingShingle False Alarm
Timing Constraint
Service Composition
Service Basis
Authentication Protocol
Software Engineering
LI, Li
SUN, Jun
LIU, Yang
DONG, Jin Song
TAuth: Verifying timed security protocols
description Quantitative timing is often relevant to the security of systems, like web applications, cyber-physical systems, etc. Verifying timed security protocols is however challenging as both arbitrary attacking behaviors and quantitative timing may lead to undecidability. In this work, we develop a service framework to support intuitive modeling of the timed protocol, as well as automatic verification with an unbounded number of sessions. The partial soundness and completeness of our verification algorithms are formally defined and proved. We implement our method into a tool called TAuth and the experiment results show that our approach is efficient and effective in both finding security flaws and giving proofs.
format text
author LI, Li
SUN, Jun
LIU, Yang
DONG, Jin Song
author_facet LI, Li
SUN, Jun
LIU, Yang
DONG, Jin Song
author_sort LI, Li
title TAuth: Verifying timed security protocols
title_short TAuth: Verifying timed security protocols
title_full TAuth: Verifying timed security protocols
title_fullStr TAuth: Verifying timed security protocols
title_full_unstemmed TAuth: Verifying timed security protocols
title_sort tauth: verifying timed security protocols
publisher Institutional Knowledge at Singapore Management University
publishDate 2014
url https://ink.library.smu.edu.sg/sis_research/4987
https://ink.library.smu.edu.sg/context/sis_research/article/5990/viewcontent/tauth.pdf
_version_ 1770575168763068416