Back to Search
Start Over
Short Paper: Modular Black-box Runtime Verification of Security Protocols
- Source :
- Proceedings of the 15th Workshop on Programming Languages and Analysis for Security.
- Publication Year :
- 2020
- Publisher :
- ACM, 2020.
-
Abstract
- Verification techniques have been applied to the design of secure protocols for decades. However, relatively few efforts have been made to ensure that verified designs are also implemented securely. Static code verification techniques offer one way to bridge the verification gap between design and implementation, but require substantial expertise and manual labor to realize in practice. In this short paper, we propose black-box runtime verification as an alternative approach to extend the security guarantees of protocol designs to their implementations. Instead of instrumenting the complete protocol implementation, our approach only requires instrumenting common cryptographic libraries and network interfaces with a runtime monitor that is automatically synthesized from the protocol specification. This lightweight technique allows the effort for instrumentation to be shared among different protocols and ensures security with presumably minimal performance overhead.
- Subjects :
- Protocol (science)
050101 languages & linguistics
business.industry
Computer science
05 social sciences
Runtime verification
Overhead (engineering)
Cryptography
02 engineering and technology
Network interface
Cryptographic protocol
Modular design
Embedded system
0202 electrical engineering, electronic engineering, information engineering
020201 artificial intelligence & image processing
0501 psychology and cognitive sciences
Instrumentation (computer programming)
business
Subjects
Details
- Database :
- OpenAIRE
- Journal :
- Proceedings of the 15th Workshop on Programming Languages and Analysis for Security
- Accession number :
- edsair.doi...........bb3a98224332f1c12feda7c343d6825a
- Full Text :
- https://doi.org/10.1145/3411506.3417596