Specifying and Modelling Secure Channels in Strand Spaces

We adapt the Strand Spaces model to reason abstractly about layered security protocols, where an Application Layer protocol is layered on top of a secure transport protocol. The model abstracts away from the implementation of the secure transport protocol and just captures the properties that it provides to the Application Layer. We illustrate the usefulness of the model by using it to verify a small single sign-on protocol.

[1]  Alessandro Armando,et al.  Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps , 2008, FMSE '08.

[2]  Sadie Creese,et al.  The attacker in ubiquitous computing environments: formalising the threat model , 2003 .

[3]  Joshua D. Guttman,et al.  Authentication tests and the structure of bundles , 2002, Theor. Comput. Sci..

[4]  Gavin Lowe,et al.  Specifying Secure Transport Channels , 2008, 2008 21st IEEE Computer Security Foundations Symposium.

[5]  Joshua D. Guttman,et al.  Strand spaces: why is a security protocol correct? , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[6]  David Aspinall,et al.  Formalising Java's Data Race Free Guarantee , 2007, TPHOLs.

[7]  Andrew William Roscoe,et al.  The Theory and Practice of Concurrency , 1997 .

[8]  Alessandro Armando,et al.  LTL Model Checking for Security Protocols , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).

[9]  Michele Bugliesi,et al.  Language Based Secure Communication , 2008, 2008 21st IEEE Computer Security Foundations Symposium.

[10]  Hanne Riis Nielson,et al.  Using static analysis to validate the SAML single sign-on protocol , 2005, WITS '05.

[11]  Joshua D. Guttman,et al.  Authentication tests , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[12]  Lawrence C. Paulson,et al.  Verifying Second-Level Security Protocols , 2003, TPHOLs.

[13]  Gavin Lowe On the specification and analysis of secure transport layers , 2008 .

[14]  Gavin Lowe,et al.  Analysing TLS in the strand spaces model , 2011, J. Comput. Secur..

[15]  Stephen A. Thomas SSL and TLS Essentials: Securing the Web with CD-ROM , 2000 .

[16]  Gavin Lowe Specifying Secure Transport Layers , 2008 .