On the Prevention and Detection of Replay Attacks Using a Logic-Based Verification Tool

Anca D. Jurcut, Tom Coffey, Reiner Dojen

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

This paper is concerned with the design and verification of security protocols. It focuses on how to prevent protocol design weaknesses that are exploitable by intruder replay attacks. The reasons why protocols are vulnerable to replay attack are analysed and based on this analysis a new set of design guidelines to ensure resistance to these attacks is proposed. Further, an empirical study using a verification tool is carried out on a range of protocols that are known to be vulnerable to replay attacks, as well as some amended versions that are known to be free of these weaknesses. The goal of this study is to verify conformance of the protocols to the proposed design guidelines, by establishing that protocols which do not adhere to these guidelines contain weaknesses that are exploitable by replay attacks. Where non-conformance with the design guidelines is established by the verification tool the protocol can be amended to fix the design flaw.

Original languageEnglish
Title of host publicationComputer Networks - 21st International Conference, CN 2014, Proceedings
PublisherSpringer Verlag
Pages128-137
Number of pages10
ISBN (Print)9783319079400
DOIs
Publication statusPublished - 2014

Publication series

NameCommunications in Computer and Information Science
Volume431
ISSN (Print)1865-0929

Keywords

  • attack detection
  • design guidelines
  • formal verification
  • replay attacks
  • security protocols

Fingerprint

Dive into the research topics of 'On the Prevention and Detection of Replay Attacks Using a Logic-Based Verification Tool'. Together they form a unique fingerprint.

Cite this