On the automated correction of security protocols susceptible to a replay attack

4Citations
Citations of this article
27Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Although there exist informal design guidelines and formal development support, security protocol development is time-consuming because design is error-prone. In this paper, we introduce SHRIMP, a mechanism that aims to speed up the development cycle by adding automated aid for protocol diagnosis and repair. SHRIMP relies on existing verification tools both to analyse an intermediate protocol and to compute attacks if the protocol is flawed. Then it analyses such attacks to pinpoint the source of the failure and synthesises appropriate patches, using Abadi and Needham's principles for protocol design. We have translated some of these principles into formal requirements on (sets of) protocol steps. For each requirement, there is a collection of rules that transform a set of protocol steps violating the requirement into a set conforming it. We have successfully tested our mechanism on 36 faulty protocols, getting a repair rate of 90%. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Lopez P, J. C., Monroy, R., & Hutter, D. (2007). On the automated correction of security protocols susceptible to a replay attack. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4734 LNCS, pp. 594–609). Springer Verlag. https://doi.org/10.1007/978-3-540-74835-9_39

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free