Zur Kurzanzeige

Verification of Security Properties Using Formal Techniques

dc.contributor.advisorHogrefe, Dieter Prof. Dr.
dc.contributor.authorAl-Shadly, Saleh
dc.date.accessioned2014-02-12T09:11:42Z
dc.date.available2014-02-12T09:11:42Z
dc.date.issued2014-02-12
dc.identifier.urihttp://hdl.handle.net/11858/00-1735-0000-0022-5E24-0
dc.identifier.urihttp://dx.doi.org/10.53846/goediss-4357
dc.identifier.urihttp://dx.doi.org/10.53846/goediss-4357
dc.identifier.urihttp://dx.doi.org/10.53846/goediss-4357
dc.language.isoengde
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/
dc.subject.ddc510de
dc.titleVerification of Security Properties Using Formal Techniquesde
dc.typedoctoralThesisde
dc.contributor.refereeHogrefe, Dieter Prof. Dr.
dc.date.examination2013-04-09
dc.description.abstractengNowadays, the necessity of developing collaborative and distributed computing systems makes networks, and specially Internet, the key element of the system design process. Several new applications have been appeared in the Internet which require a variety of security requirements must be ful lled. There are applications that exchange sensitive and private information which must be secret and authentic. Other applications (i.e. real-time applications) which require a certain level of quality of service should be maintained. Thus, the traditional solutions can not ful ll the new requirements. Usually, requirements such as con dentiality and integrity are provided using cryptography. In current computing systems, cryptography should not only provide those requirements but also it must guarantee other security requirements such as non-repudiation, anonymity, DoS-resistance, and so on. Consequently, new security protocols must be proposed in order to cover the continuous needs. Due to distributed nature of security protocols and the hostile environment where they are usually executed, the design of correct security protocols is di cult and error-prone. Thus, analyzing their correctness is a crucial task. Formal methods have been intensively used for analyzing con dentiality and integrity requirements and there exists several automated tools for such analysis. However, the use of formal methods for analyzing requirements such as DoS-resistance is still not mature and an emergent eld. This research is concerned to study the application of formal techniques in speci cation and veri cation of security requirements focusing on authentication, secrecy and DoS-resistance requirements. Additionally, an attempt to quantify the impact of denial of service attacks on the network and evaluate their defense mechanisms is also presented. Speci c outcomes of this work include: A comprehensive survey of most important formal techniques and tools for speci cation and veri cation of security protocols; Analysis of authentication and secrecy requirements of an authentication protocol of inter-domain handover using AVISPA toolkit; Presenting the state-of-art of formal techniques of denial of modeling and analysis of service as well as other DoS basic knowledge such as types of DoS attacks, attack tools, defense mechanisms and strategies, etc; Quantifying the impact of DoS attacks on networks and evaluating their active defenses through simulation, and Outlook for automating Meadows's cost-based framework using probabilistic model checking.de
dc.contributor.coRefereeFu, Xiaoming Prof. Dr.
dc.contributor.thirdRefereeGrabowski, Jens Prof. Dr.
dc.contributor.thirdRefereeEckart, Modrow Prof. Dr.
dc.contributor.thirdRefereeRieck, Konrad Prof. Dr.
dc.contributor.thirdRefereeWaack, Stephan Prof. Dr.
dc.subject.engModel checkingde
dc.subject.engSecurity protocolsde
dc.subject.engSecurity propertiesde
dc.subject.engFormal methodsde
dc.subject.engFormal techniquesde
dc.identifier.urnurn:nbn:de:gbv:7-11858/00-1735-0000-0022-5E24-0-3
dc.affiliation.instituteFakultät für Mathematik und Informatikde
dc.subject.gokfullInformatik (PPN619939052)de
dc.identifier.ppn778399419


Dateien

Thumbnail

Das Dokument erscheint in:

Zur Kurzanzeige