[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3357613.3357639acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
short-paper

Verification of internet protocol properties using cooperating automaton objects

Published: 12 September 2019 Publication History

Abstract

Reliable verification of compliance with information security requirements when exchanging data on the Internet is an urgent task. Information is transferred through interaction protocols that are being constantly updated and changed. Methods for verifying the compliance of new protocols with safety requirements are practically significant. Among compliance verification methods, an important place belongs to formal methods based on the study of adequate protocol models and software that implements these protocols. Such methods are known as symbolic protocol verification methods. The article describes a method for symbolic verification of such protocols. The advantage of the proposed method is the comparative simplicity and straightforwardness of the verification process achieved due to the expressive power of the used behavior specification language. The protocol specification uses the model of interacting automaton objects. The language used is CIAO (Cooperative Interaction of Automata Objects). Verification is considered using the TLS (Transport Level Security) handshake protocol as an example.

References

[1]
Internet Security Threat Report (ISTR 24). 2019. Volume 24, https://www.symantec.com/content/dam/symantec/docs/reports/istr-24-2019-en.pdf
[2]
R. Tourani, T. Mick, S. Misra and G. Panwar. 2017. Security, Privacy, and Access Control in Information-Centric Networking: A Survey. IEEE Commun. Surv. Tutor., 20 (1), 566--600.
[3]
E.W. Dijkstra. 1976. A Discipline of Programming. Prentice-Hall, Englewood Cliffs, NJ.
[4]
D.P. Sidhu and T.-K. Leung. 1989. Formal methods for protocol testing: a detailed study. IEEE Transactions on Software Engineering, 15(4), 413--426.
[5]
G. Diaz, F. Cuartero, V. Valero and F. Pelayo. 2004. Automatic verification of the TLS handshake protocol. Proceedings of the 19th ACM Symposium on Applied Computing, 789--794.
[6]
T.S. Sobh, A. Elgohary and M. Zaki. 2008. Performance improvements on the network security protocols. International Journal of Network Security, 6(1), 103--115.
[7]
K. Bhargavan, C. Fournet, R. Corin and E. Zalinescu. 2012. Verified cryptographic implementations for TLS. ACM Transactions on Information and System Security, 15(1), 3:1--3:32.
[8]
N. Kobeissi. 2018. Formal Verification for Real-World Cryptographic Protocols and Implementations. Doctoral Thesis. French Institute for Research in Computer Science and Automation.
[9]
K. Bhargavan, C. Fournet, M. Kohlweiss, et al. 2013. Implementing TLS with Verified Cryptographic Security. In Proceedings of 2013 IEEE Symposium on Security and Privacy, 445--459.
[10]
F. Novikov, L. Fedorchenko, V. Vorobiev, R. Fatkieva and D. Levonevskiy. 2017. Attribute-Based Approach of Defining the Secure Behavior of Automata Objects. In Proceedings of the 10th International Conference on Security of Information and Networks (SIN-2017), ACM, New York, NY, USA, 67--72.
[11]
T. Dierks and E. Rescorla. 2018. The Transport Layer Security (TLS) Protocol Version 1.3. IETF RFC 8446.
[12]
D. Levonevskiy, L. Fedorchenko, I. Afanasieva and F. Novikov. 2018. Architecture of the Software System for Adaptive Protection of Network Infrastructure. In Proceedings of the 11th International Conference on Security of Information and Networks (SIN-2018), ACM, New York, NY, USA, 4 pages.
[13]
A. Yu. Atiskov, F.A. Novikov, L.N. Fedorchenko, et al. 2013. Ontology-Based Analysis of Cryptography Standards and Possibilities of Their Harmonization. In Theory and Practice of Cryptography Solutions for Secure Information Systems. Hershey: IGI Global, 1--33.

Cited By

View all
  • (2022)Digital Twins of Activities: Role of Information Actions2022 32nd Conference of Open Innovations Association (FRUCT)10.23919/FRUCT56874.2022.9953805(102-111)Online publication date: 9-Nov-2022

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
SIN '19: Proceedings of the 12th International Conference on Security of Information and Networks
September 2019
179 pages
ISBN:9781450372428
DOI:10.1145/3357613
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 September 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. automata based programming
  2. behavior model
  3. network protocols
  4. secure behavior
  5. security of distributed systems
  6. verification

Qualifiers

  • Short-paper

Conference

SIN 2019

Acceptance Rates

Overall Acceptance Rate 102 of 289 submissions, 35%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 24 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Digital Twins of Activities: Role of Information Actions2022 32nd Conference of Open Innovations Association (FRUCT)10.23919/FRUCT56874.2022.9953805(102-111)Online publication date: 9-Nov-2022

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media