2019
DOI: 10.1109/tdsc.2017.2725831
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Security Protocol Attack Detection Logic with Unique Fault Discovery Capability for Freshness Attacks and Interleaving Session Attacks

Abstract: This paper introduces a new logic-based technique for detecting security protocol weaknesses that are exploitable by freshness and interleaving session attacks. This technique is realised as a special purpose logic to be used throughout the protocol design stage, where a draft of the protocol is subjected to formal analysis prior to its publication or deployment. For any detected failures the analysis also reveals their cause, facilitating design corrections.The proposed Attack Detection Logic is introduced an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
16
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(17 citation statements)
references
References 39 publications
0
16
0
Order By: Relevance
“…In 2017, Jurcut, Coffey and Dojen [21] proposed a novel logic with attack detection capabilities for the formal verification of cryptographic security protocols. This logic, referred to as the Attack Detection Logic, expands the capabilities of existing logic-based verification techniques, by adding attack detection to their traditional role of proving that protocols meet their security goals.…”
Section: Logic-based Technique For Formal Verification Of Securitmentioning
confidence: 99%
See 2 more Smart Citations
“…In 2017, Jurcut, Coffey and Dojen [21] proposed a novel logic with attack detection capabilities for the formal verification of cryptographic security protocols. This logic, referred to as the Attack Detection Logic, expands the capabilities of existing logic-based verification techniques, by adding attack detection to their traditional role of proving that protocols meet their security goals.…”
Section: Logic-based Technique For Formal Verification Of Securitmentioning
confidence: 99%
“…This section outlines a prototype implementation of the Attack Detection Logic theory [21], which was integrated into an existing logic-based verification tool CDVT [22]. The CDVT tool uses a process of deductive reasoning based on Layered Proving Tree theoretical concept [17] to produce the verification results.…”
Section: Automation Of Attack Detection Logic Theorymentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, logics have the advantages of being decidable and efficiently computable and thus can completely be automated. We use CDVT/AD verification tool [8], [9], [13] in this research, which is an automated system that implements a modal logic of knowledge and an attack detection theory. This tool can analyze the evolution of both knowledge and belief during a protocol execution and therefore is useful in addressing issues of both security and trust.…”
Section: Logic-based Verification Of Protocolsmentioning
confidence: 99%
“…The CDVT/AD verification tool [8], [9] is used to establish the correctness of the authentication session of MSCP. Further, any vulnerability in the design of the verified protocol that can be exploited by freshness and interleaving session attacks will be highlighted by the verification tool.Prior to verification, the protocol must be formally expressed using the language of the verification tool before verification starts.…”
Section: Formal Verification Of Mscpmentioning
confidence: 99%