Title :
Specifying and checking network protocol based on TLA
Author :
Wan, Liang ; Shi, Wenchang
Author_Institution :
Sch. of Inf., Renmin Univ. of China, Beijing, China
Abstract :
Network protocol vulnerability detection is paramount to network security. Formalization provides an important way for vulnerability detection. In this paper, we apply TLA, which is a powerful tool for formal analysis, to analyze network protocols. An approach is proposed that aims to detect vulnerabilities of a protocol effectively with the TLA, with the Kerberos protocol being taken as an example. Firstly, roles for the protocol, especially those related to intruders, are created. Then actions of the roles are specified. Sessions among the roles are built. And environment parameters are set. A prototype program is developed to implement the approach, which covers the model and the detection properties of the protocol. Experiments show that our approach is effective and powerful in specifying and checking a protocol, and it is better than SPIN and SMV.
Keywords :
formal verification; protocols; security of data; temporal logic; Kerberos protocol; SMV; SPIN; TLA; formal analysis; model checking; network protocol vulnerability detection; network security; prototype program; temporal logic of actions; Buildings; Educational institutions; Protocols; Safety; Security; Servers; Action; Model Checking; Protocol; Security; TLA;
Conference_Titel :
Anti-Counterfeiting, Security and Identification (ASID), 2012 International Conference on
Conference_Location :
Taipei
Print_ISBN :
978-1-4673-2144-0
Electronic_ISBN :
2163-5048
DOI :
10.1109/ICASID.2012.6325286