2017 IEEE 30th Computer Security Foundations Symposium (CSF) 2017
DOI: 10.1109/csf.2017.7
|View full text |Cite
|
Sign up to set email alerts
|

Symbolic and Computational Mechanized Verification of the ARINC823 Avionic Protocols

Abstract: Abstract-We present the first formal analysis of two avionic protocols that aim to secure air-ground communications, the ARINC823 public-key and shared-key protocols. We verify these protocols both in the symbolic model of cryptography, using ProVerif, and in the computational model, using CryptoVerif. While we confirm many security properties of these protocols, we also find several weaknesses, attacks, and imprecisions in the standard. We propose fixes for these problems. This case study required the specifi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
27
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 36 publications
(27 citation statements)
references
References 40 publications
(38 reference statements)
0
27
0
Order By: Relevance
“…The only protocol that we fail to address is the avionic protocol [11] as it requires to prove an injective property. We plan to explore how to (soundly) improve the treatment of disequalities for injective queries in ProVerif, as we did for non injective queries.…”
Section: Conclusion and Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…The only protocol that we fail to address is the avionic protocol [11] as it requires to prove an injective property. We plan to explore how to (soundly) improve the treatment of disequalities for injective queries in ProVerif, as we did for non injective queries.…”
Section: Conclusion and Discussionmentioning
confidence: 99%
“…Several protocols include counters (e.g. Yubikey [34], avionic protocols [11]) and their security rely on the fact that a counter cannot take twice the same value. In voting protocols, the voting server typically maintains a table that contains the list of voters that have voted so far, which can be crucial when revotes are forbidden [21].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…ProVerif is a state-of-the art automatic prover for security protocols. It has already been used to analyse hundreds of protocols of the literature, including TLS [24], voting protocols [25], and avionic protocols [26]. We chose an automatic tool to conduct our security analysis in order to analyse multiple corruption scenarios.…”
Section: Introductionmentioning
confidence: 99%
“…Since its beginning in 80s, a lot of progress has been done in this area, and it is now a common good practice to formally analyse protocols using symbolic techniques in order to spot flaws possibly before their deployment, as it was recently done e.g. in TLS 1.3 [7,17], or for an avionic protocol [9].…”
Section: Introductionmentioning
confidence: 99%