Cross-Layer Verification of Type Flaw Attacks on Security Protocols

@inproceedings{Long2007CrossLayerVO,
  title={Cross-Layer Verification of Type Flaw Attacks on Security Protocols},
  author={Benjamin W. Long and Colin J. Fidge and David A. Carrington},
  booktitle={ACSC},
  year={2007}
}
Security protocols are often specified at the application layer ; however, application layer specifications give little detail regarding message data structures at the presentation layer upon which some implementation-dependent attacks rely. In this paper we present an approach to verifying security protocols in which both the application and presentation layers are modelled. Using the Group Domain of Interpretation protocol as an example, our application layer specification of the protocol is… CONTINUE READING