TY - GEN
T1 - Uncovering attacks on security protocols
AU - Yang, Wuu
PY - 2005/12/1
Y1 - 2005/12/1
N2 - Security protocols are indispensable in secure communication. We give an operational semantics of security protocols in terms of a Prolog-like language. With this semantics, we can uncover attacks on a security protocol that are possible with no more than a given number of rounds. Though our approach is exhaustive testing, the majority of fruitless search is cut off by selecting a small number of representative values that could be sent by an attacker. Hence, the number of scenarios is relatively small and our method is quite practical. Furthermore, our method not only reports possible attacks but also describes the attacks in great detail. This description would be very helpful to protocol designers and analyzers.
AB - Security protocols are indispensable in secure communication. We give an operational semantics of security protocols in terms of a Prolog-like language. With this semantics, we can uncover attacks on a security protocol that are possible with no more than a given number of rounds. Though our approach is exhaustive testing, the majority of fruitless search is cut off by selecting a small number of representative values that could be sent by an attacker. Hence, the number of scenarios is relatively small and our method is quite practical. Furthermore, our method not only reports possible attacks but also describes the attacks in great detail. This description would be very helpful to protocol designers and analyzers.
UR - http://www.scopus.com/inward/record.url?scp=33646795345&partnerID=8YFLogxK
U2 - 10.1109/ICITA.2005.292
DO - 10.1109/ICITA.2005.292
M3 - Conference contribution
AN - SCOPUS:33646795345
SN - 0769523161
SN - 9780769523163
T3 - Proceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005
SP - 572
EP - 575
BT - Proceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005
T2 - 3rd International Conference on Information Technology and Applications, ICITA 2005
Y2 - 4 July 2005 through 7 July 2005
ER -