Chapter

Formal Techniques for Networked and Distributed Systems – FORTE 2008

Volume 5048 of the series Lecture Notes in Computer Science pp 305-323

Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol

  • Wei WangAffiliated withThe State Key Laboratory of Information Security, Graduate University of Chinese Academy of Science
  • , Dongyao JiAffiliated withThe State Key Laboratory of Information Security, Graduate University of Chinese Academy of Science

Abstract

In this paper, we use SPIN, a model checker for LTL, to detect vulnerabilities in the AACS drive-host authentication protocol. Before the detection, we propose a variant of the Dolev-Yao attacker model [4] and incorporate the synthesis and analysis rules [7] to formalize the protocol and the intruder capabilities. During the detection, we check the authenticity of the protocol and identify a few weaknesses. Besides, we propose a novel collusion attack that seriously threaten the security of the protocol, and build a corresponding LTL formula. Based on the formula, SPIN detects a few relevant attack instances in the original scheme of the authentication protocol and a modified scheme advanced in [5].

Keywords

AACS SPIN Model Checker LTL Authenticity Collusion Attack