Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach
Title | Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Kobeissi, N., Bhargavan, K., Blanchet, B. |
Conference Name | 2017 IEEE European Symposium on Security and Privacy (EuroS P) |
ISBN Number | 978-1-5090-5762-7 |
Keywords | Analytical models, automated verification, compositionality, Computational modeling, Computer bugs, cryptographic protocol code, cryptographic protocols, cryptography, CryptoVerif proof, domain-specific language, end-to end secure messaging protocols, formal verification, Java, JavaScript programs, policy, policy-based collaboration, privacy, ProScript protocol code, protocol verification, ProVerif, pubcrawl, secure messaging |
Abstract | Many popular web applications incorporate end-toend secure messaging protocols, which seek to ensure that messages sent between users are kept confidential and authenticated, even if the web application's servers are broken into or otherwise compelled into releasing all their data. Protocols that promise such strong security guarantees should be held up to rigorous analysis, since protocol flaws and implementations bugs can easily lead to real-world attacks. We propose a novel methodology that allows protocol designers, implementers, and security analysts to collaboratively verify a protocol using automated tools. The protocol is implemented in ProScript, a new domain-specific language that is designed for writing cryptographic protocol code that can both be executed within JavaScript programs and automatically translated to a readable model in the applied pi calculus. This model can then be analyzed symbolically using ProVerif to find attacks in a variety of threat models. The model can also be used as the basis of a computational proof using CryptoVerif, which reduces the security of the protocol to standard cryptographic assumptions. If ProVerif finds an attack, or if the CryptoVerif proof reveals a weakness, the protocol designer modifies the ProScript protocol code and regenerates the model to enable a new analysis. We demonstrate our methodology by implementing and analyzing a variant of the popular Signal Protocol with only minor differences. We use ProVerif and CryptoVerif to find new and previously-known weaknesses in the protocol and suggest practical countermeasures. Our ProScript protocol code is incorporated within the current release of Cryptocat, a desktop secure messenger application written in JavaScript. Our results indicate that, with disciplined programming and some verification expertise, the systematic analysis of complex cryptographic web applications is now becoming practical. |
URL | https://ieeexplore.ieee.org/document/7961995/ |
DOI | 10.1109/EuroSP.2017.38 |
Citation Key | kobeissi_automated_2017 |
- formal verification
- secure messaging
- pubcrawl
- ProVerif
- protocol verification
- ProScript protocol code
- privacy
- policy-based collaboration
- Policy
- JavaScript programs
- Java
- Analytical models
- end-to end secure messaging protocols
- Domain-Specific Language
- CryptoVerif proof
- Cryptography
- Cryptographic Protocols
- cryptographic protocol code
- Computer bugs
- Computational modeling
- Compositionality
- automated verification