Skip to main content

Abstract

The problem of security protocols correctness is one of the main security problems connected with communication in computer networks. Several automatic tools for verifying properties of such protocols have been proposed and used. These tools allow to find weaknesses in many variants of the protocols proposed so far. However, these tools are not entirely bug-free. In this paper, we investigate some selected problems of well known, and widely used tools for protocols verification such as AVISPA, Scyther, VerICS or PathFinder. In our considerations, we propose a few examples of protocols that cannot be used in practice or do not ensure security goals, but are positively verified by some tools. We discuss problems connected with these observations and compare how different verification tools can solve them.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Armando, A., et. al.: The AVISPA tool for the automated validation of internet security protocols and applications. In: Proceedings of 17th International Conference on Computer Aided Verification (CAV’05), vol. 3576 of LNCS, pp. 281–285. Springer, Berlin (2005)

    Google Scholar 

  2. Armando, A., Compagna, L.: An optimized intruder model for SAT-based model checking of security protocols. In: Armando, A., Vigan‘o, L. (eds.) ENTCS, vol. 125, pp. 91–108. Elsevier Science Publishers, Amsterdam (2005)

    Google Scholar 

  3. Basin, D., Modersheim, S., Vigano, L.: An on-the-fly model-checker for security protocol analysis. In: Proceedings of ESORICS’03, vol. 2808 of LNCS, pp. 253–270. Springer, Berlin (2003)

    Google Scholar 

  4. Boichut, Y., Heam, P.-C., Kouchnarenko, O., Oehl, F.: Improvements on the Genet and Klay technique to automatically verify security protocols. In: Proceedings of AVIS’04 (2004)

    Google Scholar 

  5. Cremers, C.: The Scyther tool: verification, falsification, and analysis of security protocols. In: Proceedings of the 20th International Conference on Computer Aided Verification, pp. 414–418. Princeton, USA (2008)

    Google Scholar 

  6. Cremers, C.: Unbounded verification, falsification, and characterization of security protocols by pattern refinement. In: Proceedings of 15th ACM Conference on Computer and Communications Security (CCS 2008), pp. 119–128. ACM (2008)

    Google Scholar 

  7. Dembinski, P., Janowska, A., Janowski, P., Penczek, W., Polrola, A., Szreter, M., Wozna, B., Zbrzezny, A.: VerICS: A tool for verifying timed automata and estelle specifications. In: Proceedings of the 9th International Conference TACAS’03, vol. 2619 of LNCS, pp. 278–283. Springer, Berlin (2003)

    Google Scholar 

  8. Kacprzak, M., Nabialek, W., Niewiadomski, A., Penczek, W., Polrola, A., Szreter, M., Zbrzezny, A.: Verics 2008—a model checker for high-level languages. Artif. Intell. Stud. 5(28), 131–140 (2008)

    Google Scholar 

  9. Kurkowski, M., Penczek, W.: Verifying security protocols modelled by networks of automata. Fundamenta Informaticae 79(3–4), 453–471 (2007)

    MathSciNet  MATH  Google Scholar 

  10. Lowe, G.: An attack on the Needham-Schroeder public-key authentication protocol. Inf. Process. Lett. 56(3), 131–133 (1995)

    Article  MATH  Google Scholar 

  11. Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using fdr. In: TACAS, LNCS, pp. 147–166. Springer, Berlin (1996)

    Google Scholar 

  12. Siedlecka-Lamch, O., Kurkowski, M., Piech, H.: A new effective approach for modeling and verification of security protocols. In: Proceedings of 21st International Workshop on Concurrency, Specification and Programming (CS&P 2012), pp. 191–202. Humboldt University Press, Berlin (2012)

    Google Scholar 

  13. Siedlecka-Lamch, O., Kurkowski, M., Szymoniak, S., Piech, H.: Parallel bounded model checking of security protocols. In: Proceedings of PPAM’13, vol. 8384 of LNCS. Springer, Berlin (2014)

    Google Scholar 

  14. Turuani, M.: The CL-ATSE protocol analyzer. In: Proceedings of RTA’06, vol. 4098 of LNCS, pp. 277–286. Springer, Berlin (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mirosław Kurkowski .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Kurkowski, M., Kozakiewicz, A., Siedlecka-Lamch, O. (2017). Some Remarks on Security Protocols Verification Tools. In: Grzech, A., Świątek, J., Wilimowska, Z., Borzemski, L. (eds) Information Systems Architecture and Technology: Proceedings of 37th International Conference on Information Systems Architecture and Technology – ISAT 2016 – Part II. Advances in Intelligent Systems and Computing, vol 522. Springer, Cham. https://doi.org/10.1007/978-3-319-46586-9_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-46586-9_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-46585-2

  • Online ISBN: 978-3-319-46586-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics