Model Checking the IKEv2 Protocol Using Spin

2019 17th International Conference on Privacy, Security and Trust (PST)(2019)

引用 4|浏览4
暂无评分
摘要
Previous analyses of IKEv2 concluded that the protocol was suffering from two authentication vulnerabilities: the penultimate authentication flaw and a vulnerability that leads to a reflection attack. In this paper, we analyze the IKEv2 protocol specification using the Spin model checker. To do so, we extend and improve an existing modeling method that allows analyzing security protocols using Spin. For completeness, we indicate each abstraction we make when writing the model. As a result, we confirm the penultimate authentication flaw and show that the reflection attack is actually not applicable.
更多
查看译文
关键词
Spin,model checking,IKEv2,authenticated key-exchange,security protocols
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要