Utilization of Timed Automata as a Verification Tool for Security Protocols Ahmet Koltuksuz Yasar University Department of Computer Engineering Izmir, Turkey ahmet.koltuksuz@yasar.edu.tr Burcu Kulahcioglu, Murat Ozkan Izmir Institute of Technology Department of Computer Engineering Izmir, Turkey {burcukulahcioglu, muratozkan}@iyte.edu.tr AbstractTimed Automata is an extension to the automata- theoretic approach for the modeling of real time systems that introduces time into the classical automata. It has become an important research area in both the context of formal languages and modeling and verification of real time systems since it was proposed by Alur and Dill in the early nineties. Timed automata proposes an efficient model checking method for verification real time systems having mature and efficient automatic verification tools. One of the application areas of timed automata is the verification of security protocols which are known to be time sensitive. This study aims to make use of timed automata as a verification tool for security protocols and gives a case study on the initial part of the Neuman- Stubblebine Repeated Authentication Protocol. Keywords-timed automata, model checking, security protocol verification I. INTRODUCTION Real time systems can be analyzed using formal methods to verify that a system meets some specified requirements. In the literature, most verification methods involve the partial ordering of the occurrence of events in a qualitative notion instead of modeling quantitative time information. However, the correctness of a real time system depends on its quantitative timed properties. To meet the need for timed formalisms, some untimed formalisms are extended with timing information such as timed Petri nets [1], many real time logics [2] and timed process algebras such as CSP [3]. However, timed automata [4] is the most commonly used model for timed systems having mature and efficient automatic verification tools and for an easily understandable syntax and semantics with the support of C-like data structures. Timed automata is proposed as an extension to the automata-theoretic approach, which is extended with clock variables. Timed automata theory has become an important research area and been widely studied in the context of both formal languages and verification of real time systems. The theory of timed automata allows us to create models of real time systems which can be verified using model checking methods [5]. Model checking with timed automata involves building a finite model of a system and verifies a property by traversing through all reachable states. It has the advantages of being fully automatic, and generating counter example in case of a negative result nevertheless, it suffers from the state space explosion problem. One of the most important application areas of timed automata is the verification of the security protocols. Since the use of computers and the internet is considerably increasing, the correctness of security protocols is getting more important. Since an attacker can exploit the timing of message flows, quantitative time information is critical for security issues. This study utilizes timed automata as a verification tool for security protocols including timing information. We directly model the Neuman-Stubblebine repeated authentication protocol [6] using the UPPAAL timed automata tool [7] and perform verification by analyzing its security properties to find possible attacks on it. The next section gives the related work including the timed automata studies on security protocols. Section 3 briefly defines timed automata, the data structures used in its implementation, and the UPPAAL tool. Section 4 explains the modeling of the initial authentication part of the protocol including the modeling of cryptology, automata for the protocol principals and the intruder. The verification of our model is performed in Section 5, in which we present the type flaw attack we found and analyze the quantitative timing properties of the protocol. In addition, we give comments on the modeling and verification of the subsequent authentication part. Section 6 concludes the paper with the results we obtained and the further perspectives for the analysis of the subsequent part of the protocol. II. RELATED WORK Timed automata has several academic and industrial case studies such as the modeling and verification of TDMA (Time Division Multiple Access) protocol [8], audio-video protocols [9], a power controller [10] and a lip synchronization algorithm [11]. In this study, we focus on modeling and verification of security protocols. In the literature, several theorem proving and model checking methods are used to verify the correctness of security protocols, most of which involve the qualitative notion of time rather than the quantitative notion. In this paper, we concentrate on the timed automata formalism verified with model checking methods. Some recent studies analyze security protocols with quantitative timing properties involving the use of timed automata. The studies in [12] and [13] examine Kerberos, TMN, Neumann Stubblebine, Andrew Secure and Wide Mouthed Frog protocols by not modeling them directly as timed automata, but translating a language specification of a 2010 Fourth IEEE International Conference on Secure Software Integration and Reliability Improvement Companion 978-0-7695-4087-0/10 $26.00 © 2010 IEEE DOI 10.1109/SSIRI-C.2010.27 86