Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verification framework introduced in [5] to monitor complex, history-based security-properties of the SSL-protocol. We give a deta...
Saved in:
| Published in | International Conference on Software Engineering 2008 Vol. 2008; no. 26 |
|---|---|
| Main Authors | , |
| Format | Journal Article |
| Language | English |
| Published |
18.05.2008
|
| Online Access | Get full text |
| ISBN | 1605580422 9781605580425 |
| ISSN | 0270-5257 |
| DOI | 10.1145/1370905.1370910 |
Cover
| Summary: | This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verification framework introduced in [5] to monitor complex, history-based security-properties of the SSL-protocol. We give a detailed account of the methodology, compare its formal expressiveness to prior art, and describe its application to an open-source Java-implementation of the SSLprotocol. In particular, we show how one can make use of runtime verification to dynamically enforce that assumptions on the crypto-protocol implementations (that are commonly made when statically verifying crypto-protocol specifications against security requirements) are actually satisfied in a given protocol implementation at runtime. Our analysis of these properties shows that some important runtime correctness properties of the SSL-protocol exceed the commonly used class of safety properties, and as such also the expressiveness of other monitoring frameworks. |
|---|---|
| Bibliography: | SourceType-Scholarly Journals-2 ObjectType-Feature-2 ObjectType-Conference Paper-1 content type line 23 SourceType-Conference Papers & Proceedings-1 ObjectType-Article-3 |
| ISBN: | 1605580422 9781605580425 |
| ISSN: | 0270-5257 |
| DOI: | 10.1145/1370905.1370910 |