Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models
International audience Attack generation from an abstract model of a protocol is not an easy task. We present BIFROST (Bifrost Implements Formally Reliable prOtocols for Security and Trust), a tool that takes an abstract model of a cryptographic protocol and outputs an implementation in C of the pro...
Main Authors: | , , , , |
---|---|
Other Authors: | , , , , , |
Format: | Conference Object |
Language: | English |
Published: |
HAL CCSD
2022
|
Subjects: | |
Online Access: | https://hal.uca.fr/hal-03835049 https://hal.uca.fr/hal-03835049/document https://hal.uca.fr/hal-03835049/file/Nordsec_2022_paper_7662.pdf |
id |
ftccsdartic:oai:HAL:hal-03835049v1 |
---|---|
record_format |
openpolar |
spelling |
ftccsdartic:oai:HAL:hal-03835049v1 2023-05-15T16:48:56+02:00 Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models Sivelle, Camille Debbah, Lorys, Puys, Maxime Lafourcade, Pascal Franco-Rondisson, Thibault Commissariat à l'énergie atomique et aux énergies alternatives - Laboratoire d'Electronique et de Technologie de l'Information (CEA-LETI) Direction de Recherche Technologique (CEA) (DRT (CEA)) Commissariat à l'énergie atomique et aux énergies alternatives (CEA)-Commissariat à l'énergie atomique et aux énergies alternatives (CEA) Laboratoire d'Informatique, de Modélisation et d'Optimisation des Systèmes (LIMOS) Ecole Nationale Supérieure des Mines de St Etienne-Centre National de la Recherche Scientifique (CNRS)-Université Clermont Auvergne (UCA)-Institut national polytechnique Clermont Auvergne (INP Clermont Auvergne) Université Clermont Auvergne (UCA)-Université Clermont Auvergne (UCA) Reykjavik, Iceland 2022-11-30 https://hal.uca.fr/hal-03835049 https://hal.uca.fr/hal-03835049/document https://hal.uca.fr/hal-03835049/file/Nordsec_2022_paper_7662.pdf en eng HAL CCSD hal-03835049 https://hal.uca.fr/hal-03835049 https://hal.uca.fr/hal-03835049/document https://hal.uca.fr/hal-03835049/file/Nordsec_2022_paper_7662.pdf info:eu-repo/semantics/OpenAccess The 27th Nordic Conference on Secure IT Systems, NordSec https://hal.uca.fr/hal-03835049 The 27th Nordic Conference on Secure IT Systems, NordSec, Nov 2022, Reykjavik, Iceland [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] info:eu-repo/semantics/conferenceObject Conference papers 2022 ftccsdartic 2023-02-12T11:50:40Z International audience Attack generation from an abstract model of a protocol is not an easy task. We present BIFROST (Bifrost Implements Formally Reliable prOtocols for Security and Trust), a tool that takes an abstract model of a cryptographic protocol and outputs an implementation in C of the protocol and either a proof in ProVerif that the protocol is safe or an implementation of the attack found. We use FS2PV, KaRaMeL, ProVerif and a dedicated parser to analyze the attack traces produced by ProVerif. If an attack is found then BIFROST automatically produces C code for each honest participant and for the intruder in order to mount the attack. Conference Object Iceland Archive ouverte HAL (Hyper Article en Ligne, CCSD - Centre pour la Communication Scientifique Directe) |
institution |
Open Polar |
collection |
Archive ouverte HAL (Hyper Article en Ligne, CCSD - Centre pour la Communication Scientifique Directe) |
op_collection_id |
ftccsdartic |
language |
English |
topic |
[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] |
spellingShingle |
[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] Sivelle, Camille Debbah, Lorys, Puys, Maxime Lafourcade, Pascal Franco-Rondisson, Thibault Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models |
topic_facet |
[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] |
description |
International audience Attack generation from an abstract model of a protocol is not an easy task. We present BIFROST (Bifrost Implements Formally Reliable prOtocols for Security and Trust), a tool that takes an abstract model of a cryptographic protocol and outputs an implementation in C of the protocol and either a proof in ProVerif that the protocol is safe or an implementation of the attack found. We use FS2PV, KaRaMeL, ProVerif and a dedicated parser to analyze the attack traces produced by ProVerif. If an attack is found then BIFROST automatically produces C code for each honest participant and for the intruder in order to mount the attack. |
author2 |
Commissariat à l'énergie atomique et aux énergies alternatives - Laboratoire d'Electronique et de Technologie de l'Information (CEA-LETI) Direction de Recherche Technologique (CEA) (DRT (CEA)) Commissariat à l'énergie atomique et aux énergies alternatives (CEA)-Commissariat à l'énergie atomique et aux énergies alternatives (CEA) Laboratoire d'Informatique, de Modélisation et d'Optimisation des Systèmes (LIMOS) Ecole Nationale Supérieure des Mines de St Etienne-Centre National de la Recherche Scientifique (CNRS)-Université Clermont Auvergne (UCA)-Institut national polytechnique Clermont Auvergne (INP Clermont Auvergne) Université Clermont Auvergne (UCA)-Université Clermont Auvergne (UCA) |
format |
Conference Object |
author |
Sivelle, Camille Debbah, Lorys, Puys, Maxime Lafourcade, Pascal Franco-Rondisson, Thibault |
author_facet |
Sivelle, Camille Debbah, Lorys, Puys, Maxime Lafourcade, Pascal Franco-Rondisson, Thibault |
author_sort |
Sivelle, Camille |
title |
Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models |
title_short |
Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models |
title_full |
Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models |
title_fullStr |
Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models |
title_full_unstemmed |
Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models |
title_sort |
automatic implementations synthesis of secure protocols and attacks from abstract models |
publisher |
HAL CCSD |
publishDate |
2022 |
url |
https://hal.uca.fr/hal-03835049 https://hal.uca.fr/hal-03835049/document https://hal.uca.fr/hal-03835049/file/Nordsec_2022_paper_7662.pdf |
op_coverage |
Reykjavik, Iceland |
genre |
Iceland |
genre_facet |
Iceland |
op_source |
The 27th Nordic Conference on Secure IT Systems, NordSec https://hal.uca.fr/hal-03835049 The 27th Nordic Conference on Secure IT Systems, NordSec, Nov 2022, Reykjavik, Iceland |
op_relation |
hal-03835049 https://hal.uca.fr/hal-03835049 https://hal.uca.fr/hal-03835049/document https://hal.uca.fr/hal-03835049/file/Nordsec_2022_paper_7662.pdf |
op_rights |
info:eu-repo/semantics/OpenAccess |
_version_ |
1766039016057077760 |