Zur Kurzanzeige

dc.contributor.author
Klenze, Tobias
dc.contributor.supervisor
Basin, David
dc.contributor.supervisor
Perrig, Adrian
dc.contributor.supervisor
Sprenger, Christoph
dc.contributor.supervisor
Cortier, Véronique
dc.date.accessioned
2021-09-24T08:05:41Z
dc.date.available
2021-09-23T21:09:23Z
dc.date.available
2021-09-24T06:39:20Z
dc.date.available
2021-09-24T07:12:48Z
dc.date.available
2021-09-24T08:05:41Z
dc.date.issued
2021
dc.identifier.uri
http://hdl.handle.net/20.500.11850/506662
dc.identifier.doi
10.3929/ethz-b-000506662
dc.description.abstract
Today's Internet is built on decades-old networking protocols that lack scalability, reliability and security. In response, the networking community has developed path-aware Internet architectures that solve these issues while simultaneously empowering end hosts. In these architectures autonomous systems authorize forwarding paths in accordance with their routing policies, and protect paths using cryptographic authenticators. For each packet, the sending end host selects an authorized paths and embeds it and its authenticators in the header. This allows routers to efficiently determine how to forward the packet. The central security property of the data plane, i.e., of forwarding, is that packets can only travel along authorized paths. This property, that we call path authorization, protects the routing policies of autonomous from malicious senders. Further security properties are source authentication, which allows routers and the destination to authenticate the sender, and path validation, which allows the sender and the destination to verify that the packet traversed the path embedded in the header. Existing schemes that achieve these properties require long authenticators to be embedded in each packet's header. We propose EPIC, a family of protocols that achieve the same guarantees with substantially reduced overhead. The fundamental role of packet forwarding in the Internet's ecosystem and the complexity of the authentication mechanisms employed call for a formal analysis of EPIC, and of related protocols. We develop a parameterized verification framework for data plane protocols in Isabelle/HOL. We first formulate an abstract model without an attacker for which we prove path authorization. We then refine this model by introducing a Dolev--Yao attacker and by protecting authorized paths using (generic) cryptographic validation fields. This model is parametrized by the path authorization mechanism and assumes five simple verification conditions that allow us to prove the refinement of the abstract model. We propose two novel attacker models and two sets of assumptions on the underlying routing protocol that allow us to classify protocols and distinguish them by how strong their guarantees are. We validate our framework by instantiating it with several concrete protocols and proving that they each satisfy the verification conditions (and hence path authorization). Invariants needed for the security proof are proven in the parametrized model; instances do not need to show invariants. Our framework thus supports low-effort security proofs for data plane protocols. We extend our framework in multiple ways, to allow a wide range of protocols and different attackers to be modeled. Our verification results hold for arbitrary network topologies and sets of authorized paths, a generality that state-of-the-art automated protocol verifiers cannot currently provide.
en_US
dc.format
application/pdf
en_US
dc.language.iso
en
en_US
dc.publisher
ETH Zurich
en_US
dc.rights.uri
http://rightsstatements.org/page/InC-NC/1.0/
dc.subject
Formal verification
en_US
dc.subject
Network Protocols
en_US
dc.subject
Security protocol verification
en_US
dc.subject
Security protocol
en_US
dc.title
Formal Development of Secure Data Plane Protocols
en_US
dc.type
Doctoral Thesis
dc.rights.license
In Copyright - Non-Commercial Use Permitted
dc.date.published
2021-09-24
ethz.size
157 p.
en_US
ethz.code.ddc
DDC - DDC::0 - Computer science, information & general works::000 - Generalities, science
en_US
ethz.identifier.diss
27649
en_US
ethz.publication.place
Zurich
en_US
ethz.publication.status
published
en_US
ethz.leitzahl
ETH Zürich::00002 - ETH Zürich::00012 - Lehre und Forschung::00007 - Departemente::02150 - Dep. Informatik / Dep. of Computer Science::02660 - Institut für Informationssicherheit / Institute of Information Security::03634 - Basin, David / Basin, David
en_US
ethz.leitzahl.certified
ETH Zürich::00002 - ETH Zürich::00012 - Lehre und Forschung::00007 - Departemente::02150 - Dep. Informatik / Dep. of Computer Science::02660 - Institut für Informationssicherheit / Institute of Information Security::03634 - Basin, David / Basin, David
en_US
ethz.date.deposited
2021-09-23T21:09:32Z
ethz.source
FORM
ethz.eth
yes
en_US
ethz.availability
Open access
en_US
ethz.rosetta.installDate
2021-09-24T06:39:27Z
ethz.rosetta.lastUpdated
2022-03-29T13:31:24Z
ethz.rosetta.versionExported
true
ethz.COinS
ctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.atitle=Formal%20Development%20of%20Secure%20Data%20Plane%20Protocols&rft.date=2021&rft.au=Klenze,%20Tobias&rft.genre=unknown&rft.btitle=Formal%20Development%20of%20Secure%20Data%20Plane%20Protocols
 Printexemplar via ETH-Bibliothek suchen

Dateien zu diesem Eintrag

Thumbnail

Publikationstyp

Zur Kurzanzeige