TY - GEN
T1 - Determining a parallel session attack on a key distribution protocol using a model checker
AU - Paşca, Vladimir
AU - Dojen, Reiner
AU - Jurcut, Anca
AU - Coffey, Tom
PY - 2008
Y1 - 2008
N2 - The use of security protocols to protect sensitive information is critical. However, flaws in the design of security protocols can make them ineffective. This paper discusses various attacks against security protocols that exploit weaknesses in their design and a key-distribution protocol is analysed using a model checker. The analysis reveals weaknesses in the protocol, which can be exploited in a parallel session attack that allows an attacker to impersonate a legitimate principal. Correction to the protocol are proposed and a formal analysis of the fix is presented. The results of this analysis provide confidence in the correctness and effectiveness of the proposed corrected protocol. Copyright ACM 2008.
AB - The use of security protocols to protect sensitive information is critical. However, flaws in the design of security protocols can make them ineffective. This paper discusses various attacks against security protocols that exploit weaknesses in their design and a key-distribution protocol is analysed using a model checker. The analysis reveals weaknesses in the protocol, which can be exploited in a parallel session attack that allows an attacker to impersonate a legitimate principal. Correction to the protocol are proposed and a formal analysis of the fix is presented. The results of this analysis provide confidence in the correctness and effectiveness of the proposed corrected protocol. Copyright ACM 2008.
KW - Attacks on security protocols
KW - Formal analysis of security protocols
KW - Model checking
KW - Parallel session attack
UR - http://www.scopus.com/inward/record.url?scp=70349318079&partnerID=8YFLogxK
U2 - 10.1145/1497185.1497218
DO - 10.1145/1497185.1497218
M3 - Conference contribution
AN - SCOPUS:70349318079
SN - 9781605582696
T3 - MoMM2008 - The 6th International Conference on Advances in Mobile Computing and Multimedia
SP - 150
EP - 155
BT - MoMM2008 - The 6th International Conference on Advances in Mobile Computing and Multimedia
T2 - 6th International Conference on Advances in Mobile Computing and Multimedia, MoMM2008
Y2 - 24 November 2008 through 26 November 2008
ER -