06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

B.1 Brief Introduction to the CasperFDR<br />

B.1 Brief Introduction to the CasperFDR<br />

For the sake of completeness, we subjected the proposed protocols in this thesis to <strong>for</strong>mal<br />

mechanical analysis based on the CasperFDR tool. The CasperFDR approach uses<br />

the Communicating Sequential Processes (CSP) [143]; a mathematical framework <strong>for</strong> the<br />

description and analysis of systems that consist of processes (sub-systems). The state of<br />

a process in the CSP changes by engaging with (pre-dened) events. The CSP language<br />

denes how dierent sub-processes can be constructed along with how to dene their interactions.<br />

The Failures-Divergence Renement (FDR) [233] is a model-checking tool <strong>for</strong><br />

state machines that is rooted in the CSP framework. The FDR model-checking tool denes<br />

and analyse a systems as described below:<br />

1. All (honest) agents (entities) taking part in a system are modelled as the CSP (sub)<br />

processes, along with the intruder that can interact with other agents in the protocol.<br />

2. The resulting system is tested against the dened (desired) security properties. The<br />

FDR searches the state space to investigate whether any insecure traces can be found.<br />

3. If FDR nds an insecure trace, then the system does not satisfy the desired security<br />

property and the protocol is considered to be insecure in relation to the given security<br />

property.<br />

Using the CSP to dene a system is tedious and painstaking, which is remarkably simplied<br />

by the Casper framework. In Casper, a user species a protocol using abstract notations,<br />

similar to the one that are used to describe protocols in academic literature. The Casper<br />

takes these notations, convert them to CSP code, which is suitable to be analysed by the<br />

FDR model checking tool. There<strong>for</strong>e, CasperFDR represents an approach where a protocol<br />

is dened in the Casper notations and then FDR tool is used to verify its suitability under<br />

given security properties.<br />

A Casper script can be divided into two main sections: protocol and system denition,<br />

which are discussed as follow:<br />

B.1.1<br />

Protocol Denition<br />

The protocol denition section of a Casper script denes the generic operations of a protocol.<br />

The protocol denition can be sub-divided into four components that are discussed<br />

below:<br />

Protocol Description: This section represented by #Protocol description in a Casper<br />

script denes the message sequence of the protocol. The notations used in this section are<br />

similar to the standard method of describing a protocol [142].<br />

Free variables: The variables and functions that are used by the protocol denition are<br />

dened in a section that is represented as #Free variables. The variables and functions<br />

241

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!