Hide metadata

dc.date.accessioned2013-03-12T08:08:16Z
dc.date.available2013-03-12T08:08:16Z
dc.date.issued2006en_US
dc.date.submitted2006-06-30en_US
dc.identifier.citationGrimeland, Martin. Modeling and analysis of time-dependent security protocols in Real-Time Maude. Masteroppgave, University of Oslo, 2006en_US
dc.identifier.urihttp://hdl.handle.net/10852/9495
dc.description.abstractReal-Time Maude extends the rewriting logic-based Maude tool to support formal specification, simulation, and further formal analysis of real-time systems. The specification language of Real-Time Maude emphasizes expressiveness and ease of specification. The high-performance Real-Time Maude tool provides a range of analysis capabilities, including (timed) rewriting for prototyping, (time-bounded) explicit-state breadth-first search for reachability analysis, and time-bounded linear temporal logic model checking. Real-Time Maude has previously been used to model and analyze a set of advanced real-time systems, such as large communication protocols, complex wireless sensor networks, and scheduling algorithms. Each of these studies shows that Real-Time Maude has much to contribute in the modeling and analysis of distributed real-time systems. This master's thesis explores the use of Real-Time Maude to model and analyze time-dependent security protocols. I have modeled and analyzed two well known time-dependent cryptographic protocol: the benchmark Wide-mouthed-frog protocol, and the larger "commercial" Kerberos protocol. To analyze the protocols in a hostile environment, we need to model intruders. I have first defined a very general "Dolev-Yao" intruder, which can perform any number of actions in zero time. This leads to "Zeno" behaviors, and nontermination of our time-bounded analysis commands within reasonable time and space constraints. In this thesis, I have suggested to avoid such Zeno behaviors by restricting the intruders to perform at most n actions per time unit. The advantage of such a restricted intruder model is that the model is more intuitive and does not lead to "Zeno" behaviors, and that time-bounded search and model checking commands are guaranteed to terminate. Furthermore, since the analysis commands terminate, we can define a strategy that increases the intruder capacity after each "failed" command. In this way, all possible intruder behaviors are still "covered". Although such a strategy should be easy to implement, I have not had the time to do so. Instead, I gradually increased "by hand" the intruder capacity after analysis commands that did not find errors, and was able to discover all known flaws as well some new flaws that, to the best of my knowledge, have not been described previously. The models of Wide-mouthed frog and Kerberos in Real-Time Maude seems more intuitive, easier to understand, and more natural than other published work. Furthermore, we expressed advanced properties of the systems quite easily using Real-Time Maude' search commands or its model checker commands.nor
dc.language.isoengen_US
dc.titleModeling and analysis of time-dependent security protocols in Real-Time Maude : Master's thesisen_US
dc.typeMaster thesisen_US
dc.date.updated2006-08-07en_US
dc.creator.authorGrimeland, Martinen_US
dc.subject.nsiVDP::420en_US
dc.identifier.bibliographiccitationinfo:ofi/fmt:kev:mtx:ctx&ctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&rft.au=Grimeland, Martin&rft.title=Modeling and analysis of time-dependent security protocols in Real-Time Maude&rft.inst=University of Oslo&rft.date=2006&rft.degree=Masteroppgaveen_US
dc.identifier.urnURN:NBN:no-12572en_US
dc.type.documentMasteroppgaveen_US
dc.identifier.duo42522en_US
dc.contributor.supervisorPeter Csaba Ölveczkyen_US
dc.identifier.bibsys060800518en_US


Files in this item

FilesSizeFormatView

No file.

Appears in the following Collection

Hide metadata