About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Conference paper

Set-Pi: Set Membership pi-Calculus

From

Department of Applied Mathematics and Computer Science, Technical University of Denmark1

Language-Based Technology, Department of Applied Mathematics and Computer Science, Technical University of Denmark2

Communication protocols often rely on stateful mechanisms to ensure certain security properties. For example, counters and timestamps can be used to ensure authentication, or the security of communication can depend on whether a particular key is registered to a server or it has been revoked. ProVerif, like other state of the art tools for protocol analysis, achieves good performance by converting a formal protocol specification into a set of Horn clauses, that represent a monotonically growing set of facts that a Dolev-Yao attacker can derive from the system.

Since this set of facts is not state-dependent, the category of protocols of our interest cannot be precisely analysed by such tools, as they would report false attacks due to the over-approximation. In this paper we present Set-π, an extension of the Applied π-calculus that includes primitives for handling databases of objects, and propose a translation from Set-π into Horn clauses that employs the set-membership abstraction to capture the non-monotonicity of the state.

Furthermore, we give a characterisation of authentication properties in terms of the set properties in the language, and prove the correctness of our approach. Finally we showcase our method with three examples, a simple authentication protocol based on counters, a key registration protocol, and a model of the Yubikey security device.

Language: English
Publisher: IEEE
Year: 2015
Pages: 185-198
Proceedings: 2015 IEEE 28th Computer Security Foundations SymposiumComputer Security Foundations Symposium
Series: I E E E Computer Security Foundations Symposium. Proceedings
ISBN: 1467375381 , 146737539x , 9781467375382 , 9781467375399 , 1467375373 , 146737539X and 9781467375375
ISSN: 23748303 , 19401434 , 23775459 and 10636900
Types: Conference paper
DOI: 10.1109/CSF.2015.20
ORCIDs: Mödersheim, Sebastian Alexander , Nielson, Flemming and Nielson, Hanne Riis

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis