Automated Verification of Accountability in Security Protocols

05/28/2018
by   Robert Künnemann, et al.
0

Accounting for misbehavior, instead of postulating trustworthiness, has been put forward as a new paradigm in protocol design. Accountability is meant to establish trust in the first place and to recognize and react if this trust is violated. Recently, a protocol-agnostic definition of accountability was proposed, characterizing misbehavior as deviations from the protocol that cause security violations. In this work, we provide the first mechanised method for the verification of accountability and demonstrate its use for verification and attack finding on various examples from the accountability and causality literature, including Kroll's accountable algorithms protocol. We reach a high degree of automation by transferring accountability to the centralized adversary setting in which almost all protocol verification tools operate. We show that accountability can be expressed in terms of trace properties, resulting in a sound and complete verification technique.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/08/2022

Sound Verification of Security Protocols: From Design to Interoperable Implementations (extended version)

We provide a framework consisting of tools and metatheorems for the end-...
research
06/22/2020

Verifying Accountability for Unbounded Sets of Participants

Little can be achieved in the design of security protocols without trust...
research
12/05/2022

A Generic Methodology for the Modular Verification of Security Protocol Implementations

Security protocols are essential building blocks of modern IT systems. S...
research
11/06/2022

DeepSec: Deciding Equivalence Properties for Security Protocols – Improved theory and practice

Automated verification has become an essential part in the security eval...
research
10/07/2019

Towards a Data Centric Approach for the Design and Verification of Cryptographic Protocols

We propose MetaCP, a Meta Cryptography Protocol verification tool, as an...
research
08/28/2017

A Type System for Privacy Properties (Technical Report)

Mature push button tools have emerged for checking trace properties (e.g...
research
08/10/2022

Verification of the busy-forbidden protocol (using an extension of the cones and foci framework)

The busy-forbidden protocol is a new readers-writer lock with no resourc...

Please sign up or login with your details

Forgot password? Click here to reset