Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models

International audience Attack generation from an abstract model of a protocol is not an easy task. We present BIFROST (Bifrost Implements Formally Reliable prOtocols for Security and Trust), a tool that takes an abstract model of a cryptographic protocol and outputs an implementation in C of the pro...

Full description

Bibliographic Details
Main Authors: Sivelle, Camille, Debbah, Lorys, Puys, Maxime, Lafourcade, Pascal, Franco-Rondisson, Thibault
Other Authors: Commissariat à l'énergie atomique et aux énergies alternatives - Laboratoire d'Electronique et de Technologie de l'Information (CEA-LETI), Direction de Recherche Technologique (CEA) (DRT (CEA)), Commissariat à l'énergie atomique et aux énergies alternatives (CEA)-Commissariat à l'énergie atomique et aux énergies alternatives (CEA), Laboratoire d'Informatique, de Modélisation et d'Optimisation des Systèmes (LIMOS), Ecole Nationale Supérieure des Mines de St Etienne-Centre National de la Recherche Scientifique (CNRS)-Université Clermont Auvergne (UCA)-Institut national polytechnique Clermont Auvergne (INP Clermont Auvergne), Université Clermont Auvergne (UCA)-Université Clermont Auvergne (UCA)
Format: Conference Object
Language:English
Published: HAL CCSD 2022
Subjects:
Online Access:https://hal.uca.fr/hal-03835049
https://hal.uca.fr/hal-03835049/document
https://hal.uca.fr/hal-03835049/file/Nordsec_2022_paper_7662.pdf
id ftccsdartic:oai:HAL:hal-03835049v1
record_format openpolar
spelling ftccsdartic:oai:HAL:hal-03835049v1 2023-05-15T16:48:56+02:00 Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models Sivelle, Camille Debbah, Lorys, Puys, Maxime Lafourcade, Pascal Franco-Rondisson, Thibault Commissariat à l'énergie atomique et aux énergies alternatives - Laboratoire d'Electronique et de Technologie de l'Information (CEA-LETI) Direction de Recherche Technologique (CEA) (DRT (CEA)) Commissariat à l'énergie atomique et aux énergies alternatives (CEA)-Commissariat à l'énergie atomique et aux énergies alternatives (CEA) Laboratoire d'Informatique, de Modélisation et d'Optimisation des Systèmes (LIMOS) Ecole Nationale Supérieure des Mines de St Etienne-Centre National de la Recherche Scientifique (CNRS)-Université Clermont Auvergne (UCA)-Institut national polytechnique Clermont Auvergne (INP Clermont Auvergne) Université Clermont Auvergne (UCA)-Université Clermont Auvergne (UCA) Reykjavik, Iceland 2022-11-30 https://hal.uca.fr/hal-03835049 https://hal.uca.fr/hal-03835049/document https://hal.uca.fr/hal-03835049/file/Nordsec_2022_paper_7662.pdf en eng HAL CCSD hal-03835049 https://hal.uca.fr/hal-03835049 https://hal.uca.fr/hal-03835049/document https://hal.uca.fr/hal-03835049/file/Nordsec_2022_paper_7662.pdf info:eu-repo/semantics/OpenAccess The 27th Nordic Conference on Secure IT Systems, NordSec https://hal.uca.fr/hal-03835049 The 27th Nordic Conference on Secure IT Systems, NordSec, Nov 2022, Reykjavik, Iceland [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] info:eu-repo/semantics/conferenceObject Conference papers 2022 ftccsdartic 2023-02-12T11:50:40Z International audience Attack generation from an abstract model of a protocol is not an easy task. We present BIFROST (Bifrost Implements Formally Reliable prOtocols for Security and Trust), a tool that takes an abstract model of a cryptographic protocol and outputs an implementation in C of the protocol and either a proof in ProVerif that the protocol is safe or an implementation of the attack found. We use FS2PV, KaRaMeL, ProVerif and a dedicated parser to analyze the attack traces produced by ProVerif. If an attack is found then BIFROST automatically produces C code for each honest participant and for the intruder in order to mount the attack. Conference Object Iceland Archive ouverte HAL (Hyper Article en Ligne, CCSD - Centre pour la Communication Scientifique Directe)
institution Open Polar
collection Archive ouverte HAL (Hyper Article en Ligne, CCSD - Centre pour la Communication Scientifique Directe)
op_collection_id ftccsdartic
language English
topic [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
spellingShingle [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Sivelle, Camille
Debbah, Lorys,
Puys, Maxime
Lafourcade, Pascal
Franco-Rondisson, Thibault
Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models
topic_facet [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
description International audience Attack generation from an abstract model of a protocol is not an easy task. We present BIFROST (Bifrost Implements Formally Reliable prOtocols for Security and Trust), a tool that takes an abstract model of a cryptographic protocol and outputs an implementation in C of the protocol and either a proof in ProVerif that the protocol is safe or an implementation of the attack found. We use FS2PV, KaRaMeL, ProVerif and a dedicated parser to analyze the attack traces produced by ProVerif. If an attack is found then BIFROST automatically produces C code for each honest participant and for the intruder in order to mount the attack.
author2 Commissariat à l'énergie atomique et aux énergies alternatives - Laboratoire d'Electronique et de Technologie de l'Information (CEA-LETI)
Direction de Recherche Technologique (CEA) (DRT (CEA))
Commissariat à l'énergie atomique et aux énergies alternatives (CEA)-Commissariat à l'énergie atomique et aux énergies alternatives (CEA)
Laboratoire d'Informatique, de Modélisation et d'Optimisation des Systèmes (LIMOS)
Ecole Nationale Supérieure des Mines de St Etienne-Centre National de la Recherche Scientifique (CNRS)-Université Clermont Auvergne (UCA)-Institut national polytechnique Clermont Auvergne (INP Clermont Auvergne)
Université Clermont Auvergne (UCA)-Université Clermont Auvergne (UCA)
format Conference Object
author Sivelle, Camille
Debbah, Lorys,
Puys, Maxime
Lafourcade, Pascal
Franco-Rondisson, Thibault
author_facet Sivelle, Camille
Debbah, Lorys,
Puys, Maxime
Lafourcade, Pascal
Franco-Rondisson, Thibault
author_sort Sivelle, Camille
title Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models
title_short Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models
title_full Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models
title_fullStr Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models
title_full_unstemmed Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models
title_sort automatic implementations synthesis of secure protocols and attacks from abstract models
publisher HAL CCSD
publishDate 2022
url https://hal.uca.fr/hal-03835049
https://hal.uca.fr/hal-03835049/document
https://hal.uca.fr/hal-03835049/file/Nordsec_2022_paper_7662.pdf
op_coverage Reykjavik, Iceland
genre Iceland
genre_facet Iceland
op_source The 27th Nordic Conference on Secure IT Systems, NordSec
https://hal.uca.fr/hal-03835049
The 27th Nordic Conference on Secure IT Systems, NordSec, Nov 2022, Reykjavik, Iceland
op_relation hal-03835049
https://hal.uca.fr/hal-03835049
https://hal.uca.fr/hal-03835049/document
https://hal.uca.fr/hal-03835049/file/Nordsec_2022_paper_7662.pdf
op_rights info:eu-repo/semantics/OpenAccess
_version_ 1766039016057077760