Automated Verification of Accountability in Security Protocols
Title | Automated Verification of Accountability in Security Protocols |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Künnemann, Robert, Esiyok, Ilkan, Backes, Michael |
Conference Name | 2019 IEEE 32nd Computer Security Foundations Symposium (CSF) |
Publisher | IEEE |
ISBN Number | 978-1-7281-1407-1 |
Keywords | accountability, accountability automated verification, accountable algorithms protocol, Calculus, certificate transparency, Cognition, Collaboration, composability, compositionality, computer security, cryptographic protocols, cryptography, formal methods and verification, formal verification, mechanized method, Policy Based Governance, policy-based governance, privacy, protocol verification, protocol-agnostic definition, Protocols, pubcrawl, security property, security protocol design, security protocols, security violation, Tools, traditional trust assumptions |
Abstract | Accountability is a recent paradigm in security protocol design which aims to eliminate traditional trust assumptions on parties and hold them accountable for their misbehavior. It is meant to establish trust in the first place and to recognize and react if this trust is violated. In this work, we discuss a protocol-agnostic definition of accountability: a protocol provides accountability (w.r.t. some security property) if it can identify all misbehaving parties, where misbehavior is defined as a deviation from the protocol that causes a security violation. We provide a mechanized method for the verification of accountability and demonstrate its use for verification and attack finding on various examples from the accountability and causality literature, including Certificate Transparency and Kroll^\textbackslashtextbackslashprimes Accountable Algorithms protocol. We reach a high degree of automation by expressing accountability in terms of a set of trace properties and show their soundness and completeness. |
URL | https://ieeexplore.ieee.org/document/8823726 |
DOI | 10.1109/CSF.2019.00034 |
Citation Key | kunnemann_automated_2019 |
- mechanized method
- traditional trust assumptions
- tools
- security violation
- security protocols
- security protocol design
- security property
- pubcrawl
- Protocols
- protocol-agnostic definition
- protocol verification
- privacy
- policy-based governance
- Policy Based Governance
- accountability
- formal verification
- formal methods and verification
- Cryptography
- Cryptographic Protocols
- computer security
- Compositionality
- composability
- collaboration
- cognition
- certificate transparency
- Calculus
- accountable algorithms protocol
- accountability automated verification