Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Aires Urquiza, Abraãoa | Alturki, Musab A.b; c | Ban Kirigin, Tajanad; * | Kanovich, Maxe; f | Nigam, Vivekg; a | Scedrov, Andreh; i | Talcott, Carolynj
Affiliations: [a] Federal University of Paraíba, João Pessoa, Brazil. E-mail: [email protected] | [b] KFUPM, Dhahran, Saudi Arabia. E-mail: [email protected] | [c] Runtime Verification Inc., USA | [d] Department of Mathematics, University of Rijeka, Rijeka, Croatia. E-mail: [email protected] | [e] University College London, London, UK. E-mail: [email protected] | [f] National Research University Higher School of Economics, Moscow, Russian Federation | [g] fortiss, Germany. E-mail: [email protected] | [h] University of Pennsylvania, Philadelphia, PA, USA. E-mail: [email protected] | [i] National Research University Higher School of Economics, Moscow, Russian Federation, until July 2020 | [j] SRI International, Menlo Park, CA, USA. E-mail: [email protected]
Correspondence: [*] Corresponding author: Tajana Ban Kirigin, Department of Mathematics, University of Rijeka, Radmile Matejcic 2, 51000 Rijeka, Croatia. Tel.: +385-51-584650; E-mail: [email protected].
Abstract: Protocol security verification is one of the best success stories of formal methods. However, some aspects important to protocol security, such as time and resources, are not covered by many formal models. While timing issues involve e.g., network delays and timeouts, resources such as memory, processing power, or network bandwidth are at the root of Denial of Service (DoS) attacks which have been a serious security concern. It is useful in practice and more challenging for formal protocol verification to determine whether a service is vulnerable not only to powerful intruders, but also to resource-bounded intruders that cannot generate or intercept arbitrarily large volumes of traffic. A refined Dolev–Yao intruder model is proposed, that can only consume at most some specified amount of resources in any given time window. Timed protocol theories that specify service resource usage during protocol execution are also proposed. It is shown that the proposed DoS problem is undecidable in general and is PSPACE-complete for the class of resource-bounded, balanced systems. Additionally, we describe a decidable fragment in the verification of the leakage problem for resource-sensitive timed protocol theories.
Keywords: Multiset rewriting, protocol security, complexity, denial of service
DOI: 10.3233/JCS-200012
Journal: Journal of Computer Security, vol. 29, no. 3, pp. 299-340, 2021
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]