Security protocols, properties, and their monitoring

This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verification framework introduced in [5] to monitor complex, history-based security-properties of the SSL-protocol. We give a deta...

Full description

Saved in:
Bibliographic Details
Published inInternational Conference on Software Engineering 2008 Vol. 2008; no. 26
Main Authors Bauer, Andreas, Juerjens, Jan
Format Journal Article
LanguageEnglish
Published 18.05.2008
Online AccessGet full text
ISBN1605580422
9781605580425
ISSN0270-5257
DOI10.1145/1370905.1370910

Cover

More Information
Summary:This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verification framework introduced in [5] to monitor complex, history-based security-properties of the SSL-protocol. We give a detailed account of the methodology, compare its formal expressiveness to prior art, and describe its application to an open-source Java-implementation of the SSLprotocol. In particular, we show how one can make use of runtime verification to dynamically enforce that assumptions on the crypto-protocol implementations (that are commonly made when statically verifying crypto-protocol specifications against security requirements) are actually satisfied in a given protocol implementation at runtime. Our analysis of these properties shows that some important runtime correctness properties of the SSL-protocol exceed the commonly used class of safety properties, and as such also the expressiveness of other monitoring frameworks.
Bibliography:SourceType-Scholarly Journals-2
ObjectType-Feature-2
ObjectType-Conference Paper-1
content type line 23
SourceType-Conference Papers & Proceedings-1
ObjectType-Article-3
ISBN:1605580422
9781605580425
ISSN:0270-5257
DOI:10.1145/1370905.1370910