Using interval logics for temporal analysis of security protocols

This paper presents an approach to the analysis of real-time properties of security protocols, based on the use of Interval Logic with durations to express and reason about temporal phenomena. We focus on the analysis of availability, where time is known to play a significant role, illustrate how relevant timing requirements can be formulated and show how Interval Logic can be used to prove that a system can fulfil these requirements in the presence of attackers of a given strength. We link this logic-based approach to more operational approaches.

[1]  Catherine A. Meadows,et al.  A Cost-Based Framework for Analysis of Denial of Service Networks , 2001, J. Comput. Secur..

[2]  Michael R. Hansen,et al.  An Adequate First Order Interval Logic , 1997, COMPOS.

[3]  Anders P. Ravn,et al.  Duration Specifications for Shared Processors , 1992, FTRTFT.

[4]  Virgil D. Gligor,et al.  A Note on the Denial-of-Service Problem , 1983, 1983 IEEE Symposium on Security and Privacy.

[5]  Sergio Yovine,et al.  KRONOS: a verification tool for real-time systems , 1997, International Journal on Software Tools for Technology Transfer.

[6]  Michael R. Hansen,et al.  An Approach to Analyzing Availability Properties of Security Protocols , 2003, Nord. J. Comput..

[7]  Philip Chan,et al.  Duration Calculus Specification of Schedulimg for Tasks with Shared Resources , 1995, ASIAN.

[8]  Henrik Pilegaard Modelling properties of security protocols , 2002 .

[9]  Jonathan K. Millen,et al.  A resource allocation model for denial of service , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[10]  Thomas Marthedal Rasmussen,et al.  Interval logic. Proof theory and theorem proving , 2002 .

[11]  Thomas Marthedal Rasmussen,et al.  Automated Proof Support for Interval Logics , 2001, LPAR.

[12]  Wang Yi,et al.  Uppaal in a nutshell , 1997, International Journal on Software Tools for Technology Transfer.

[13]  C. A. R. Hoare,et al.  A Calculus of Durations , 1991, Inf. Process. Lett..

[14]  ProtocolsLi GongSRI InternationalComputer Fail-Stop Protocols : An Approach to Designing Secure , 1994 .

[15]  Thomas A. Henzinger,et al.  HYTECH: a model checker for hybrid systems , 1997, International Journal on Software Tools for Technology Transfer.

[16]  Virgil D. Gligor,et al.  A formal specification and verification method for the prevention of denial of service , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.

[17]  Michael R. Hansen,et al.  A Timed Semantics for SDL , 1996, FORTE.

[18]  Lawrence C. Paulson,et al.  Proving properties of security protocols by induction , 1997, Proceedings 10th Computer Security Foundations Workshop.

[19]  Chaochen Zhou,et al.  Completeness of neighbourhood logic , 2000, J. Log. Comput..

[20]  Zohar Manna,et al.  A Hardware Semantics Based on Temporal Intervals , 1983, ICALP.

[21]  Michael R. Hansen,et al.  Duration calculus: Logical foundations , 1997, Formal Aspects of Computing.

[22]  Ben C. Moszkowski,et al.  A Temporal Logic for Multilevel Reasoning about Hardware , 1985, Computer.