Customizing Protocol Specifications for Detecting Resource Exhaustion and Guessing Attacks

Download Now
Provided by: Politecnico di Torino
Topic: Security
Format: PDF
Model checkers for security protocols often focus on basic properties, such as confidentiality or authentication, using a standard model of the Dolev-Yao intruder. In this paper, the authors explore how to model other attacks, notably guessing of secrets and denial of service by resource exhaustion, using the AVANTSSAR platform with its modeling language ASLan. They do this by adding custom intruder deduction rules and augmenting protocol transitions with constructs that keep track of these attacks.
Download Now

Find By Topic