TAuth: Verifying timed security protocols
Quantitative timing is often relevant to the security of systems, like web applications, cyber-physical systems, etc. Verifying timed security protocols is however challenging as both arbitrary attacking behaviors and quantitative timing may lead to undecidability. In this work, we develop a service...
Saved in:
Main Authors: | , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2014
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/4987 https://ink.library.smu.edu.sg/context/sis_research/article/5990/viewcontent/tauth.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-5990 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-59902020-03-12T09:44:29Z TAuth: Verifying timed security protocols LI, Li SUN, Jun LIU, Yang DONG, Jin Song Quantitative timing is often relevant to the security of systems, like web applications, cyber-physical systems, etc. Verifying timed security protocols is however challenging as both arbitrary attacking behaviors and quantitative timing may lead to undecidability. In this work, we develop a service framework to support intuitive modeling of the timed protocol, as well as automatic verification with an unbounded number of sessions. The partial soundness and completeness of our verification algorithms are formally defined and proved. We implement our method into a tool called TAuth and the experiment results show that our approach is efficient and effective in both finding security flaws and giving proofs. 2014-05-11T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/4987 info:doi/10.1007/978-3-319-11737-9_20 https://ink.library.smu.edu.sg/context/sis_research/article/5990/viewcontent/tauth.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University False Alarm Timing Constraint Service Composition Service Basis Authentication Protocol Software Engineering |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
False Alarm Timing Constraint Service Composition Service Basis Authentication Protocol Software Engineering |
spellingShingle |
False Alarm Timing Constraint Service Composition Service Basis Authentication Protocol Software Engineering LI, Li SUN, Jun LIU, Yang DONG, Jin Song TAuth: Verifying timed security protocols |
description |
Quantitative timing is often relevant to the security of systems, like web applications, cyber-physical systems, etc. Verifying timed security protocols is however challenging as both arbitrary attacking behaviors and quantitative timing may lead to undecidability. In this work, we develop a service framework to support intuitive modeling of the timed protocol, as well as automatic verification with an unbounded number of sessions. The partial soundness and completeness of our verification algorithms are formally defined and proved. We implement our method into a tool called TAuth and the experiment results show that our approach is efficient and effective in both finding security flaws and giving proofs. |
format |
text |
author |
LI, Li SUN, Jun LIU, Yang DONG, Jin Song |
author_facet |
LI, Li SUN, Jun LIU, Yang DONG, Jin Song |
author_sort |
LI, Li |
title |
TAuth: Verifying timed security protocols |
title_short |
TAuth: Verifying timed security protocols |
title_full |
TAuth: Verifying timed security protocols |
title_fullStr |
TAuth: Verifying timed security protocols |
title_full_unstemmed |
TAuth: Verifying timed security protocols |
title_sort |
tauth: verifying timed security protocols |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2014 |
url |
https://ink.library.smu.edu.sg/sis_research/4987 https://ink.library.smu.edu.sg/context/sis_research/article/5990/viewcontent/tauth.pdf |
_version_ |
1770575168763068416 |