Skip to main content
Erschienen in: International Journal of Information Security 3/2015

01.06.2015 | Regular Contribution

Analysis of two authorization protocols using Colored Petri Nets

verfasst von: Younes Seifi, Suriadi Suriadi, Ernest Foo, Colin Boyd

Erschienen in: International Journal of Information Security | Ausgabe 3/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

To prevent unauthorized access to protected trusted platform module (TPM) objects, authorization protocols, such as the object-specific authorization protocol (OSAP), have been introduced by the trusted computing group (TCG). By using OSAP, processes trying to gain access to the protected TPM objects need to prove their knowledge of relevant authorization data before access to the objects can be granted. Chen and Ryan’s 2009 analysis has demonstrated OSAP’s authentication vulnerability in sessions with shared authorization data. They also proposed the Session Key Authorization Protocol (SKAP) with fewer stages as an alternative to OSAP. Chen and Ryan’s analysis of SKAP using ProVerif proves the authentication property. The purpose of this paper was to examine the usefulness of Colored Petri Nets (CPN) and CPN Tools for security analysis. Using OSAP and SKAP as case studies, we construct intruder and authentication property models in CPN. CPN Tools is used to verify the authentication property using a Dolev–Yao-based model. Verification of the authentication property in both models using the state space tool produces results consistent with those of Chen and Ryan.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
For other parts of the Fig. 9, the reference will be shown only by writing the ‘object’ word \(+\) coordinate. Other details will be eliminated.
 
2
This assumption is consistent with the formal model shown previously in [10].
 
3
This assumption is consistent with the formal model shown previously in [10].
 
Literatur
1.
Zurück zum Zitat Abadi, M., Blanchet, B.: Computer-assisted verification of a protocol for certified email. Sci. Comput. Program. 58(1–2), 3–27 (2005)CrossRefMATHMathSciNet Abadi, M., Blanchet, B.: Computer-assisted verification of a protocol for certified email. Sci. Comput. Program. 58(1–2), 3–27 (2005)CrossRefMATHMathSciNet
2.
Zurück zum Zitat Al-Azzoni, I.: The verification of cryptographic protocols using Coloured Petri Nets. Master’s thesis, Department of Software Engineering (2004) Al-Azzoni, I.: The verification of cryptographic protocols using Coloured Petri Nets. Master’s thesis, Department of Software Engineering (2004)
3.
Zurück zum Zitat Al-Azzoni, Issam, Down, Douglas G., Khédri, Ridha: Modeling and verification of cryptographic protocols using Coloured Petri Nets and Design/CPN. Nord. J. Comput. 12(3), 200–228 (2005) Al-Azzoni, Issam, Down, Douglas G., Khédri, Ridha: Modeling and verification of cryptographic protocols using Coloured Petri Nets and Design/CPN. Nord. J. Comput. 12(3), 200–228 (2005)
4.
Zurück zum Zitat Aly, S., Mustafa, K.: Protocol verification and analysis using Colored Petri Nets. Depaul University (2003) Aly, S., Mustafa, K.: Protocol verification and analysis using Colored Petri Nets. Depaul University (2003)
5.
Zurück zum Zitat Bellare, M., Canetti, R., Krawczyk. H.: A modular approach to the design and analysis of authentication and key exchange protocols. In: Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, pp. 419–428. ACM (1998) Bellare, M., Canetti, R., Krawczyk. H.: A modular approach to the design and analysis of authentication and key exchange protocols. In: Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, pp. 419–428. ACM (1998)
6.
Zurück zum Zitat Blanchet, B.: An efficient cryptographic protocol verifier based on Prolog rules. In CSFW, number 0–7695-1146-5, pp. 82–96. IEEE Computer Society (2001) Blanchet, B.: An efficient cryptographic protocol verifier based on Prolog rules. In CSFW, number 0–7695-1146-5, pp. 82–96. IEEE Computer Society (2001)
7.
Zurück zum Zitat Bozga, L., Lakhnech, Y., Périn, M.: Hermes: An automatic tool for verification of secrecy in security protocols. In: Computer Aided Verification, pp. 219–222. Springer (2003) Bozga, L., Lakhnech, Y., Périn, M.: Hermes: An automatic tool for verification of secrecy in security protocols. In: Computer Aided Verification, pp. 219–222. Springer (2003)
8.
Zurück zum Zitat Brackin, S.H.: A HOL extension of GNY for automatically analyzing cryptographic protocols. In: Computer Security Foundations Workshop, 1996. Proceedings., 9th IEEE, pp. 62–76. IEEE (1996) Brackin, S.H.: A HOL extension of GNY for automatically analyzing cryptographic protocols. In: Computer Security Foundations Workshop, 1996. Proceedings., 9th IEEE, pp. 62–76. IEEE (1996)
9.
Zurück zum Zitat Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst. 8(1), 18–36 (1990)CrossRef Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst. 8(1), 18–36 (1990)CrossRef
10.
Zurück zum Zitat Chen, L., Ryan, M.: Attack, solution and verification for shared authorisation data in TCG TPM. In: Formal Aspects in Security and Trust, pp. 201–216 (2010) Chen, L., Ryan, M.: Attack, solution and verification for shared authorisation data in TCG TPM. In: Formal Aspects in Security and Trust, pp. 201–216 (2010)
11.
Zurück zum Zitat Chen, L., Ryan, M.: Offline dictionary attack on TCG TPM weak authorisation data, and solution. In: Gawrock, D., Reimer, H., Sadeghi, A.-R., Vishik, C. (eds.) Future of Trust in Computing, pp. 193–196 . Vieweg+Teubner (2009) Chen, L., Ryan, M.: Offline dictionary attack on TCG TPM weak authorisation data, and solution. In: Gawrock, D., Reimer, H., Sadeghi, A.-R., Vishik, C. (eds.) Future of Trust in Computing, pp. 193–196 . Vieweg+Teubner (2009)
12.
Zurück zum Zitat Cheng, A., Christensen, S., Mortensen, K.H.: Model checking Coloured Petri Nets exploiting strongly connected components. Citeseer (1997) Cheng, A., Christensen, S., Mortensen, K.H.: Model checking Coloured Petri Nets exploiting strongly connected components. Citeseer (1997)
13.
Zurück zum Zitat Christensen, S., Mortensen, K.H.: Design/CPN ASK-CTL Manual (1996) Christensen, S., Mortensen, K.H.: Design/CPN ASK-CTL Manual (1996)
14.
Zurück zum Zitat Clarke, E.M., Emerson, E.A., Sistla, A.P.: Automatic verification of finite-state concurrent systems using temporal logic specifications. ACM Trans. Program. Lang. Syst. 8(2), 244–263 (1986) Clarke, E.M., Emerson, E.A., Sistla, A.P.: Automatic verification of finite-state concurrent systems using temporal logic specifications. ACM Trans. Program. Lang. Syst. 8(2), 244–263 (1986)
15.
Zurück zum Zitat Cremers, C.J.F.: The Scyther Tool: verification, falsification, and analysis of security protocols. In: Computer Aided Verification, pp. 414–418. Springer (2008) Cremers, C.J.F.: The Scyther Tool: verification, falsification, and analysis of security protocols. In: Computer Aided Verification, pp. 414–418. Springer (2008)
16.
Zurück zum Zitat Doyle, E.M.: Automated security analysis of cryptographic protocols using Coloured Petri Net specifications (1997) Doyle, E.M.: Automated security analysis of cryptographic protocols using Coloured Petri Net specifications (1997)
17.
Zurück zum Zitat Dutertre, B., Schneider, S.: Using a PVS embedding of CSP to verify authentication protocols. In: Theorem Proving in Higher Order Logics, pp. 121–136 (1997) Dutertre, B., Schneider, S.: Using a PVS embedding of CSP to verify authentication protocols. In: Theorem Proving in Higher Order Logics, pp. 121–136 (1997)
18.
Zurück zum Zitat Fontan, B., Mota, S., Villemur, T., Saqui-Sannes, P., Courtiat, J.P.: UML-based modeling and formal verification of authentication protocols (2006) Fontan, B., Mota, S., Villemur, T., Saqui-Sannes, P., Courtiat, J.P.: UML-based modeling and formal verification of authentication protocols (2006)
19.
Zurück zum Zitat Gong, L., Needham, R., Yahalom, R.: Reasoning about belief in cryptographic protocols. In: Research in Security and Privacy, 1990. Proceedings., 1990 IEEE Computer Society Symposium on, pp. 234–248. IEEE (1990) Gong, L., Needham, R., Yahalom, R.: Reasoning about belief in cryptographic protocols. In: Research in Security and Privacy, 1990. Proceedings., 1990 IEEE Computer Society Symposium on, pp. 234–248. IEEE (1990)
20.
Zurück zum Zitat Hollestelle, G., Mauw, S., Cremers, C. J. F.: Systematic analysis of attacks on security protocols. Master’s Thesis, Technical University of Eindhover, Department of Mathematics and Computer Science (2005) Hollestelle, G., Mauw, S., Cremers, C. J. F.: Systematic analysis of attacks on security protocols. Master’s Thesis, Technical University of Eindhover, Department of Mathematics and Computer Science (2005)
24.
Zurück zum Zitat ISO/IEC 9797–2.: Information technology—security techniques—Message Authentication Codes (MACs)—part 2: Mechanisms using a dedicated hash-function (2002) ISO/IEC 9797–2.: Information technology—security techniques—Message Authentication Codes (MACs)—part 2: Mechanisms using a dedicated hash-function (2002)
25.
Zurück zum Zitat Jensen, K.: A brief introduction to Coloured Petri Nets. In: Tools and Algorithms for the Construction and Analysis of Systems, pp. 203–208. Springer, Berlin, Heidelberg (1997) Jensen, K.: A brief introduction to Coloured Petri Nets. In: Tools and Algorithms for the Construction and Analysis of Systems, pp. 203–208. Springer, Berlin, Heidelberg (1997)
26.
Zurück zum Zitat Jensen, K.: Coloured Petri Nets. Basic Concepts, Analysis Methods and Practical Use, volume 1, Basic Concepts. Monographs in Theoretical Computer Science. Springer, New York, 2nd corrected printing 1997, ISBN: 3-540-60943-1 (1997) Jensen, K.: Coloured Petri Nets. Basic Concepts, Analysis Methods and Practical Use, volume 1, Basic Concepts. Monographs in Theoretical Computer Science. Springer, New York, 2nd corrected printing 1997, ISBN: 3-540-60943-1 (1997)
27.
Zurück zum Zitat Jensen, K.: Coloured Petri Nets. Basic Concepts, Analysis Methods and Practical Use., volume 2, Analysis Methods. Monographs in Theoretical Computer Science. Springer, New York, 2nd corrected printing 1997, ISBN: 3-540-58276-2 (1997) Jensen, K.: Coloured Petri Nets. Basic Concepts, Analysis Methods and Practical Use., volume 2, Analysis Methods. Monographs in Theoretical Computer Science. Springer, New York, 2nd corrected printing 1997, ISBN: 3-540-58276-2 (1997)
28.
Zurück zum Zitat Jensen, K.: Special section on Coloured Petri Nets. Int. J. Softw. Tools Technol. Transf. (STTT) 9(3), 209–212 (2007) Jensen, K.: Special section on Coloured Petri Nets. Int. J. Softw. Tools Technol. Transf. (STTT) 9(3), 209–212 (2007)
29.
Zurück zum Zitat Jensen, K., Kristensen, L.M., Wells, L.: Coloured Petri Nets and CPN tools for modelling and validation of concurrent systems. Int. J. Softw. Tools Technol. Transf. (STTT) 9(3), 213–254 (2007)CrossRef Jensen, K., Kristensen, L.M., Wells, L.: Coloured Petri Nets and CPN tools for modelling and validation of concurrent systems. Int. J. Softw. Tools Technol. Transf. (STTT) 9(3), 213–254 (2007)CrossRef
30.
Zurück zum Zitat Jensen, K., Kristensen, L.M.: Coloured Petri Nets—Modelling and Validation of Concurrent Systems. Springer, Berlin (2009)CrossRef Jensen, K., Kristensen, L.M.: Coloured Petri Nets—Modelling and Validation of Concurrent Systems. Springer, Berlin (2009)CrossRef
31.
Zurück zum Zitat Lowe, G.: An attack on the Needham-Schroeder public-key authentication protocol. Inf. Process. Lett. 56(3), 131–133 (1995)CrossRefMATH Lowe, G.: An attack on the Needham-Schroeder public-key authentication protocol. Inf. Process. Lett. 56(3), 131–133 (1995)CrossRefMATH
32.
Zurück zum Zitat Meadows, C.A.: Formal verification of cryptographic protocols: A survey. Advances in Cryptology—ASIACRYPT’94, pp. 133–150 (1995) Meadows, C.A.: Formal verification of cryptographic protocols: A survey. Advances in Cryptology—ASIACRYPT’94, pp. 133–150 (1995)
33.
Zurück zum Zitat Millen, J.K., Clark, S.C., Freedman, S.B.: The interrogator: Protocol security analysis. IEEE Trans. Softw. Eng. SE–13(2), 274–288 (1987)CrossRef Millen, J.K., Clark, S.C., Freedman, S.B.: The interrogator: Protocol security analysis. IEEE Trans. Softw. Eng. SE–13(2), 274–288 (1987)CrossRef
34.
Zurück zum Zitat Mitchell, C.: Trusted computing, volume 6. Iet (2005) Mitchell, C.: Trusted computing, volume 6. Iet (2005)
35.
Zurück zum Zitat Rubin, A.D., Honeyman, P.: Formal Methods for the Analysis of Authentication Protocols. Technical report, Citeseer (1993) Rubin, A.D., Honeyman, P.: Formal Methods for the Analysis of Authentication Protocols. Technical report, Citeseer (1993)
36.
Zurück zum Zitat Schneider, S.: Verifying authentication protocols in CSP. IEEE Trans. Softw. Eng. 24(9), 741–758 (1998)CrossRef Schneider, S.: Verifying authentication protocols in CSP. IEEE Trans. Softw. Eng. 24(9), 741–758 (1998)CrossRef
37.
Zurück zum Zitat Seifi, Y., Suriadi, S., Foo, E., Boyd, C.: Analysis of Object-Specific Authorization Protocol (OSAP) using Coloured Petri Net. In: AISC2012 Proceedings (2012) Seifi, Y., Suriadi, S., Foo, E., Boyd, C.: Analysis of Object-Specific Authorization Protocol (OSAP) using Coloured Petri Net. In: AISC2012 Proceedings (2012)
38.
Zurück zum Zitat Seifi, Y., Suriadi, S., Foo, E., Boyd, C.: Analysis of Object-Specific Authorization Protocol (OSAP) using Coloured Petri Nets—version 1.0. Technical report, Queensland University of Technology (2011) Seifi, Y., Suriadi, S., Foo, E., Boyd, C.: Analysis of Object-Specific Authorization Protocol (OSAP) using Coloured Petri Nets—version 1.0. Technical report, Queensland University of Technology (2011)
39.
Zurück zum Zitat Tarigan, A. et al.: Survey in Formal Analysis of Security Properties of Cryptographic Protocol. Universität Bielefeld (2002) Tarigan, A. et al.: Survey in Formal Analysis of Security Properties of Cryptographic Protocol. Universität Bielefeld (2002)
40.
Zurück zum Zitat TCG.: TCG Specification Architecture Overview Revision 1.4 (2007) TCG.: TCG Specification Architecture Overview Revision 1.4 (2007)
43.
Zurück zum Zitat Viganò, Luca: Automated security protocol analysis with the AVISPA tool. Electron. Notes Theor. Comput. Sci. 155, 61–86 (2006)CrossRef Viganò, Luca: Automated security protocol analysis with the AVISPA tool. Electron. Notes Theor. Comput. Sci. 155, 61–86 (2006)CrossRef
44.
Zurück zum Zitat Westergaard, M., Evangelista, S., Kristensen, L.: ASAP: An extensible platform for state space analysis. Applications and theory of petri nets, pp. 303–312 (2009) Westergaard, M., Evangelista, S., Kristensen, L.: ASAP: An extensible platform for state space analysis. Applications and theory of petri nets, pp. 303–312 (2009)
45.
Zurück zum Zitat Westergaard, M., Maggi, F.M.: Modeling and verification of a protocol for operational support using coloured petri nets. Applications and Theory of Petri Nets. volume 6709 of Lecture Notes in Computer Science, pp. 169–188. Springer, Berlin/Heidelberg (2011) Westergaard, M., Maggi, F.M.: Modeling and verification of a protocol for operational support using coloured petri nets. Applications and Theory of Petri Nets. volume 6709 of Lecture Notes in Computer Science, pp. 169–188. Springer, Berlin/Heidelberg (2011)
46.
Zurück zum Zitat Woo, T.Y.C., Lam, S.S.: A semantic model for authentication protocols. In: Research in Security and Privacy, 1993. Proceedings., 1993 IEEE Computer Society Symposium on, pp. 178–194. IEEE (1993) Woo, T.Y.C., Lam, S.S.: A semantic model for authentication protocols. In: Research in Security and Privacy, 1993. Proceedings., 1993 IEEE Computer Society Symposium on, pp. 178–194. IEEE (1993)
47.
Zurück zum Zitat Woo, T.Y.C., Lam, S.S.: Verifying authentication protocols: Methodology and example. In Network Protocols, 1993. Proceedings., 1993 International Conference on, pp. 36–45. IEEE (1993) Woo, T.Y.C., Lam, S.S.: Verifying authentication protocols: Methodology and example. In Network Protocols, 1993. Proceedings., 1993 International Conference on, pp. 36–45. IEEE (1993)
48.
Zurück zum Zitat Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–208 (1983)CrossRefMATH Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–208 (1983)CrossRefMATH
Metadaten
Titel
Analysis of two authorization protocols using Colored Petri Nets
verfasst von
Younes Seifi
Suriadi Suriadi
Ernest Foo
Colin Boyd
Publikationsdatum
01.06.2015
Verlag
Springer Berlin Heidelberg
Erschienen in
International Journal of Information Security / Ausgabe 3/2015
Print ISSN: 1615-5262
Elektronische ISSN: 1615-5270
DOI
https://doi.org/10.1007/s10207-014-0243-z

Weitere Artikel der Ausgabe 3/2015

International Journal of Information Security 3/2015 Zur Ausgabe

Regular Contribution

GPU-assisted malware