@inbook{b41ee2d27f2b49d6b6fb1cc4b59b220b,
title = "On the Prevention and Detection of Replay Attacks Using a Logic-Based Verification Tool",
abstract = "This paper is concerned with the design and verification of security protocols. It focuses on how to prevent protocol design weaknesses that are exploitable by intruder replay attacks. The reasons why protocols are vulnerable to replay attack are analysed and based on this analysis a new set of design guidelines to ensure resistance to these attacks is proposed. Further, an empirical study using a verification tool is carried out on a range of protocols that are known to be vulnerable to replay attacks, as well as some amended versions that are known to be free of these weaknesses. The goal of this study is to verify conformance of the protocols to the proposed design guidelines, by establishing that protocols which do not adhere to these guidelines contain weaknesses that are exploitable by replay attacks. Where non-conformance with the design guidelines is established by the verification tool the protocol can be amended to fix the design flaw.",
keywords = "attack detection, design guidelines, formal verification, replay attacks, security protocols",
author = "Jurcut, {Anca D.} and Tom Coffey and Reiner Dojen",
year = "2014",
doi = "10.1007/978-3-319-07941-7_13",
language = "English",
isbn = "9783319079400",
series = "Communications in Computer and Information Science",
publisher = "Springer Verlag",
pages = "128--137",
booktitle = "Computer Networks - 21st International Conference, CN 2014, Proceedings",
}