Prasad Narayana, Ruiming Chen, Yao Zhao, Yan Chen and Hai Zhou Lab for Internet and Security Technology Northwestern University, Evanston IL Z. Judy Fu.

Slides:



Advertisements
Similar presentations
Automatic Verification Book: Chapter 6. What is verification? Traditionally, verification means proof of correctness automatic: model checking deductive:
Advertisements

PROTOCOL VERIFICATION & PROTOCOL VALIDATION. Protocol Verification Communication Protocols should be checked for correctness, robustness and performance,
1 Security in Wireless Protocols Bluetooth, , ZigBee.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
Verification of Hybrid Systems An Assessment of Current Techniques Holly Bowen.
Background information Formal verification methods based on theorem proving techniques and model­checking –to prove the absence of errors (in the formal.
Run Time Monitoring of Reactive System Models Mikhail Auguston Naval Postgraduate School Mark Trakhtenbrot Holon Academic Institute of.
ISBN Chapter 3 Describing Syntax and Semantics.
Using Programmer-Written Compiler Extensions to Catch Security Holes Authors: Ken Ashcraft and Dawson Engler Presented by : Hong Chen CS590F 2/7/2007.
An Automata-based Approach to Testing Properties in Event Traces H. Hallal, S. Boroday, A. Ulrich, A. Petrenko Sophia Antipolis, France, May 2003.
Raphael Frank 20 October 2007 Authentication & Intrusion Prevention for Multi-Link Wireless Networks.
1 Yan Chen Northwestern University Lab for Internet and Security Technology (LIST) in Northwestern.
Model Checking. Used in studying behaviors of reactive systems Typically involves three steps: Create a finite state model (FSM) of the system design.
AGVI Automatic Generation, Verification, and Implementation of security protocols By: Dawn Song, Adrian Perrig, and Doantam Phan. In: 13 th Conference.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Yan Chen, Hai Zhou Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University.
Temporal Logic of Actions (TLA) Leslie Lamport
Software Engineering, COMP201 Slide 1 Protocol Engineering Protocol Specification using CFSM model Lecture 30.
Hidden Terminal based Attack, Diagnosis and Detection Yao Zhao, Leo Zhao, Yan Chen Lab for Internet & Security Tech, Northwestern Univ.
1 Prasad Narayana, Ruiming Chen, Yao Zhao, Yan Chen and Hai Zhou Northwestern University, Evanston IL Z. Judy Fu Motorola Labs, Schaumburg IL Funded by.
Prasad Narayana, Ruiming Chen, Yao Zhao, Yan Chen and Hai Zhou Northwestern University, Evanston IL, USA Z. Judy Fu Motorola Labs, Schaumburg IL, USA Automatic.
Describing Syntax and Semantics
1 Formal Engineering of Reliable Software LASER 2004 school Tutorial, Lecture1 Natasha Sharygina Carnegie Mellon University.
Real-Time System Requirements & Design Specs Shaw - Chapters 3 & 4 Homework #2: 3.3.1, 3.4.1, Add Error states to Fig 4.1 Lecture 4/17.
1 Authentication Protocols Celia Li Computer Science and Engineering York University.
Cheng/Dillon-Software Engineering: Formal Methods Model Checking.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Towards a Logic for Wide- Area Internet Routing Nick Feamster Hari Balakrishnan.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
Vulnerabilities Prasad Narayana, Yao Zhao, Yan Chen, Judy Fu (Motorola Labs) Lab for Internet & Security Tech, Northwestern Univ.
ECE 720T5 Winter 2014 Cyber-Physical Systems Rodolfo Pellizzoni.
CS380y Junior Thesis1 The Performance of TCP/IP over Bluetooth Chris Snow Supervisors: Serguei Primak, Electrical Engineering Hanan Lutfiyya, Computer.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Benjamin Gamble. What is Time?  Can mean many different things to a computer Dynamic Equation Variable System State 2.
Remote Procedure Calls Adam Smith, Rodrigo Groppa, and Peter Tonner.
KAIS T Security architecture in a multi-hop mesh network Conference in France, Presented by JooBeom Yun.
1 The CeNTIE project is supported by the Australian Government through the Advanced Networks Program of the Department of Communications, Information Technology.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Formal Verification Lecture 9. Formal Verification Formal verification relies on Descriptions of the properties or requirements Descriptions of systems.
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
CSCE 813 Internet Security Cryptographic Protocol Analysis.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
1 CSCD 326 Data Structures I Software Design. 2 The Software Life Cycle 1. Specification 2. Design 3. Risk Analysis 4. Verification 5. Coding 6. Testing.
Network Protocols Network Systems Security Mort Anvari.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE
Scientific Debugging. Errors in Software Errors are unexpected behaviors or outputs in programs As long as software is developed by humans, it will contain.
Lecture 5 1 CSP tools for verification of Sec Prot Overview of the lecture The Casper interface Refinement checking and FDR Model checking Theorem proving.
Digital Cash Protocols: A Formal Presentation Delwin F. Lee & Mohamed G.Gouda The University of Texas at Austin Presented by Savitha Krishnamoorthy CIS.
Wireless security Wi–Fi (802.11) Security
Properties as Processes : FORTE slide Properties as Processes: their Specification and Verification Joel Kelso and George Milne School of Computer.
Yan Chen Dept. of Electrical Engineering and Computer Science Northwestern University Spring Review 2008 Award # : FA Intrusion Detection.
Formal Verification. Background Information Formal verification methods based on theorem proving techniques and model­checking –To prove the absence of.
Model Checking Lecture 1. Model checking, narrowly interpreted: Decision procedures for checking if a given Kripke structure is a model for a given formula.
Software Systems Verification and Validation Laboratory Assignment 4 Model checking Assignment date: Lab 4 Delivery date: Lab 4, 5.
Automated Formal Verification of PLC (Programmable Logic Controller) Programs
From Natural Language to LTL: Difficulties Capturing Natural Language Specification in Formal Languages for Automatic Analysis Elsa L Gunter NJIT.
Network Security Celia Li Computer Science and Engineering York University.
September 1999Compaq Computer CorporationSlide 1 of 16 Verification of cache-coherence protocols with TLA+ Homayoon Akhiani, Damien Doligez, Paul Harter,
Model Checking Lecture 1: Specification Tom Henzinger.
Copyright 1999 G.v. Bochmann ELG 7186C ch.1 1 Course Notes ELG 7186C Formal Methods for the Development of Real-Time System Applications Gregor v. Bochmann.
Security Protocols Analysis
Prasad Narayana, Yao Zhao, Yan Chen, Judy Fu (Motorola Labs)
Aspect Validation: Connecting Aspects and Formal Methods
IS 2935: Developing Secure Systems
Presentation transcript:

Prasad Narayana, Ruiming Chen, Yao Zhao, Yan Chen and Hai Zhou Lab for Internet and Security Technology Northwestern University, Evanston IL Z. Judy Fu Motorola Labs, Schaumburg IL Automatic Vulnerability Checking of Wireless Protocols through TLA+

Motivation High-speed Wireless Metropolitan Area Networks (MAN) poised to become the Next Big Thing IEEE (WiMAX) with enormous backing from the industry is set to lead the broadband wireless network space Security is especially critical for open air wireless protocols However, security analysis of the IEEE protocol largely confined to manual analysis –Incomplete –Inaccurate

Motivation (II) Formal methods for automatic vulnerability checking highly desirable –With completeness and correctness guarantees Previous studies focus on security protocols and security properties only –CSP and FDR [Lowe96], MurØ [Shmatikov98], Symbolic traces and PS-LTL [Corin06] Non-security protocol analysis focus on resource exhaustion DoS attacks and ignore protocol malfunction attacks ! –[Yu88], [Meadow99], and [Meadow02]

Our Approach Systematic and automatic checking through formal methods. –Formally specify a protocol in TLA+ (Temporal Logic of Actions) –Formally model an attacker in TLA+ –Specify requested properties –Then automatically model-check for vulnerabilities Vulnerability analysis of e specs and WiMAX standards

Potential Benefits TLA+ specs of e can be used as golden model for implementations –Implementation correctness can be model-checked TLA+ attacker models and properties can be reused as test- benches when the protocol evolves –Correctness of modifications can be quickly checked

Outline Motivation and our approach Background on TLA+ General methods and challenges Results on WiMAX initial ranging and authentication Conclusions and future work

Why TLA+ A logic resulted from the past 20 years research on concurrent reactive systems One language for both system spec and proof logic Modularity is employed for large specs Systems automatically model-checked by TLC There are some lightweight formal techniques such as Alloy/Aloca –Limited expressiveness »Cannot check temporal properties –Cannot prove a property »Instead, check whether a property is satisfied by a trace

TLA+ for Security A protocol can be specified as one monolithic system Or, it can be specified as a composition of many components: Protocol == CompA /\ CompB /\ \A i\in (1..n): Comp(i) An attacker can be specified similarly Checking security is to prove Protocol /\ Attacker  Property

Outline Motivation and our approach Background on TLA+ General methods and challenges Results on WiMAX initial ranging and authentication Conclusions and future work

TLA+ Vulnerability Checking Flow

TLA+ Protocol Specification Protocol specification in TLA+ can be easy or difficult –FSM easily translate to TLA+ –Tricky from English description to TLA+ spec: ambiguity, re-design, etc. Process of protocol specification: –Identify principals –Modularize principal behaviour using TLA+ –Combine principal specs to form a protocol spec

TLA+ Protocol Specification Challenges Challenge: Vagueness in English specification and the correctness in its translation to TLA+. Common problem for all approaches Solutions: –No easy solution exists! –Best to design protocols in TLA+ –Consult standards committee, product implementation teams among other things

Attacker Modelling Attacker capability model similar to Dolev-Yao model: Basically, attackers can: –Eavesdrop on and store messages. –Replay old messages. –Inject or spoof unprotected messages. –Corrupt messages on the channel by causing collisions. Assume the ideal cryptography: unforgeable signatures, safe encryption, and safe digest

Attacker Modelling Challenges Challenge: How to find all realistic attacks? –Model too strong: hide stealthy attacks –Model too weak: missing vulnerabilities Our solution: –Start with a relatively strong attacker model »TLC model-checks may yield unrealistic attacks. –Then weaken the attacker model »E.g.: the attacker can continuously corrupt a response from the BS. »Add restrictions on attacker to exclude such attacks. This dynamic modification of attacker model will end up with –a complete robustness proof OR –report of all attacks

Model Checking by TLC TLC is a model checker for TLA+ Has both simulation mode and model checking mode –We run simulations before a complete model checking Terminate w/o violation: robustness proved Produce violation sequence: attack trace

Model Checking Challenges Challenge: State space explosions Our Solutions –Combine similar states without loss of functionality into one state –Identify symmetry in system, which will treat the different states as one common state. –Replace some random numbers with constants having some additional properties to simulate the effects of randomness

Outline Motivation and our approach Background on TLA+ General methods and challenges Results on WiMAX initial ranging and authentication Conclusions and future work

Case Studies Initial ranging Authentication process Choices based on the criticality of function and the probability of vulnerability

Initial Ranging Process Initial ranging: the first step an SS communicates with a BS via message exchanges. An SS acquires correct timing offset and power adjustments The request-response communication happens until the BS is satisfied with the ranging parameters. ’Actual’ data communication can happen only if the initial ranging is successful.

Property to Check SS can get service (getting into “Done” state) infinitely often []<>(SSstate = “Done”) –Need to make sure that such a property is true even without an attacker (weakest attacker model)

DOS during Initial Ranging (found by TLC Model Checking) DL Subframe Contention-based Initial Ranging Slots UL Subframe REQ

Conclusions First step towards automatic vulnerability checking of WiMAX protocol with completeness and correctness guarantees Use TLA+/TLC to model malfunction DoS attacks –Avoid state space explosion in property checking –Model attackers’ capabilities for finding realistic attacks Analyzed initial ranging and authentication process in protocols

Ongoing Work Development of a rigorous process in protocol specification using TLA+ Enhance the attacker model Check vulnerabilities in other parts of standards such as mobility support and handoff procedures Examination of WiMAX upper layer protocols: Proxy Mobile IPv4, Mobile IPv6, etc.

Thanks !

Intro to TLA+ TLA+ is a simple extension of linear temporal logic –Temporal operations: []—forever, <>—eventually –With primed variable (x’) for next state –A predicate with both non-primed and primed variables defines an action: x'=x-y /\ x>y A system is usually specified as Init /\ [] [Next] x −the system satisfies Init initially and satisfies Next for all transitions −Or simply, the system starts in Init and will do Next forever

Property Spec Focus on malfunction DoS attacks currently –Client needs to reach a termination <>[] (\A i\in PartySet: Party[i].state=ObjState) –Client may not terminate []<>(\A \in PartySet: Party[i].state=ObjState)

Property Spec Challenges Challenge: TLC cannot check all properties expressible in TLA+ Our Solution: Specify properties in restricted format

28 PKMv2 Authentication Process SS and BS mutually authenticate each other and exchange keys for data encryption PKMv2 is directed by two state machines in the SS –Authentication State Machine –TEK State Machine PKMv2 employs a SATEK three-way handshake for the BS and the SS to exchange security capabilities

29 Authentication – TLA Model Each key has a life time, so the SS needs to get authorized from time to time –SS will reach the “Authorized” state infinite times []<>(SSstate =”Authorized”) TLC encounters space explosion problem –We restrict the SS to reach “Authorized” state at most a given # of times. With our attacker model, TLC model checking completed w/o violation Hence, authentication process is resistant to any attempt under the given attacker model