Withdraw
Loading…
Security models in rewriting logic for cryptographic protocols and browsers
Sasse, Ralf
Loading…
Permalink
https://hdl.handle.net/2142/34373
Description
- Title
- Security models in rewriting logic for cryptographic protocols and browsers
- Author(s)
- Sasse, Ralf
- Issue Date
- 2012-09-18T21:13:51Z
- Director of Research (if dissertation) or Advisor (if thesis)
- Meseguer, José
- Doctoral Committee Chair(s)
- Meseguer, José
- Committee Member(s)
- King, Samuel T.
- Roşu, Grigore
- Meadows, Catherine
- Chen, Shuo
- Department of Study
- Computer Science
- Discipline
- Computer Science
- Degree Granting Institution
- University of Illinois at Urbana-Champaign
- Degree Name
- Ph.D.
- Degree Level
- Dissertation
- Keyword(s)
- browser security
- visual invariants
- same origin policy
- semantic unification
- variant narrowing
- cryptographic protocol analysis
- rewriting logic
- Abstract
- This dissertation tackles crucial issues of web browser security. Web browsers are now a central part of the trusted code base of any end-user computer system, as more and more usage shifts to services provided by web sites that are accessed through those browsers. Towards this goal we identify three key aspects of web browser security: (i) the \emph{machine-to-user communication}, (ii) \emph{internal browser security concerns} and (iii) \emph{machine-to-machine communication}. We address aspects (i) and (ii) by developing a methodology that creates a formal model of a web browser and analyzes that model. We showcase this on the graphical user interface of both Internet Explorer and the Illinois Browser Operating System (IBOS) web browsers. Internal security aspects are addressed in the IBOS browser for the same origin policy. For aspect (iii) we look at the formal analysis of cryptographic protocols, independent of any particular browser. We focus on the formal analysis of protocols \emph{modulo algebraic properties} of their cryptographic functions, since it is well-known the protocol verification methods that ignore such algebraic properties using a standard Dolev-Yao model can verify as correct protocols that can be in fact broken using the algebraic properties. We adopt a symbolic approach and use the Maude-NPA cryptographic protocol analysis tool, which has extended unification capabilities modulo theories based on the new narrowing strategy we developed. We present case studies showing that appropriate protocols can be analyzed so that either attacks are found, or the absence of attacks can be proven.
- Graduation Semester
- 2012-08
- Permalink
- http://hdl.handle.net/2142/34373
- Copyright and License Information
- Copyright 2012 Ralf Sasse
Owning Collections
Graduate Dissertations and Theses at Illinois PRIMARY
Graduate Theses and Dissertations at IllinoisDissertations and Theses - Computer Science
Dissertations and Theses from the Dept. of Computer ScienceManage Files
Loading…
Edit Collection Membership
Loading…
Edit Metadata
Loading…
Edit Properties
Loading…
Embargoes
Loading…