Determining a parallel session attack on a key distribution protocol using a model checker

Vladimir Paşca, Reiner Dojen, Anca Jurcut, Tom Coffey

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The use of security protocols to protect sensitive information is critical. However, flaws in the design of security protocols can make them ineffective. This paper discusses various attacks against security protocols that exploit weaknesses in their design and a key-distribution protocol is analysed using a model checker. The analysis reveals weaknesses in the protocol, which can be exploited in a parallel session attack that allows an attacker to impersonate a legitimate principal. Correction to the protocol are proposed and a formal analysis of the fix is presented. The results of this analysis provide confidence in the correctness and effectiveness of the proposed corrected protocol. Copyright ACM 2008.

Original languageEnglish
Title of host publicationMoMM2008 - The 6th International Conference on Advances in Mobile Computing and Multimedia
Pages150-155
Number of pages6
DOIs
Publication statusPublished - 2008
Event6th International Conference on Advances in Mobile Computing and Multimedia, MoMM2008 - Linz, Austria
Duration: 24 Nov 200826 Nov 2008

Publication series

NameMoMM2008 - The 6th International Conference on Advances in Mobile Computing and Multimedia

Conference

Conference6th International Conference on Advances in Mobile Computing and Multimedia, MoMM2008
Country/TerritoryAustria
CityLinz
Period24/11/0826/11/08

Keywords

  • Attacks on security protocols
  • Formal analysis of security protocols
  • Model checking
  • Parallel session attack

Fingerprint

Dive into the research topics of 'Determining a parallel session attack on a key distribution protocol using a model checker'. Together they form a unique fingerprint.

Cite this