SPDL specifications:Security Enhancement and Technique to Overcome Software Weakness for Android-Based Local Storage

Published: 26 July 2017| Version 1 | DOI: 10.17632/f357zfzxfy.1
Contributors:
Hyunjo Kim,
Jin-young Choi

Description

This dataset is for publishing our SPDL specifications for proposed protocol described in "(Submitted to journal)Security Enhancement and Technique to Overcome Software Weakness for Android-Based Local Storage". One can check any detail information by reading above paper. [Tools for Security Protocol Verification] A poorly designed security protocol can attract malicious attacks because of its potential vulnerability. To prevent such attacks, security protocol verification before implementation is important. As a flaw in the security protocol design is among the security weaknesses, prevention is important. Thus, the security properties of the security protocol should be verified in advance using a formal technique. Various tools have been used for security protocol verification, such as Failures-Divergences Refinement (FDR)/Casper, Automated Validation of Internet Security Protocols and Applications (AVISPA), Proverif, and Scyther. In this study, the proposed preventive technique is verified using Scyther, based on a protocol description written in Security Protocol Description Language (SPDL); this provides verification, counterevidence, and analysis of the protocol in graphical user interface (GUI) form. [Modeling Proposed Protocol in SPDL for Scyther] Scyther receives the protocol description specified in SPDL and provides verification results. All entities, such as the client or server, are represented by roles. In this study, roles D and S are defined as the client and server, respectively. We publish our SPDL specifications for each global variable definition, initialization phase, and authentication phase on Mendeley Data and provide it publicly available to the research community.

Files

Steps to reproduce

-- Prepare the environment for using Scyther tool -- 1. Visit https://www.cs.ox.ac.uk/people/cas.cremers/scyther/ 2. Download appropriate version of installation file. 3. Install the Scyther tool. 4. Launch Scyther tool(ex. python sychter-gui.py) -- To check SPDL specifications for initialization phase of proposed protocol -- 5. Open 1_establish_phase.spdl file by using File > Open menu. 6. Do 'Verify Protocol' by using File > Verify Protocol -- To check SPDL specifications for authentication phase of proposed protocol -- 7. Open 2_authentication_and_sending_key_phase.spdl file by using File > Open menu. 8. Do 'Verify Protocol' by using File > Verify Protocol

Categories

Information Security, Security Protocol

License