The feasibility of this approach was demonstrated
by specifying and formally analysing a variant of
the Internet security protocol TLS, which is a typ-
ical example from the domain of crypto-based sys-
tems. We analysed the protocol using both paper-and-
pencil proofs and the automated verification with Is-
abelle/HOL. The analysis revealed a security flaw in
the initial version of TLS specification. The proto-
col specification was harden according the proposed
approach.
REFERENCES
Alam, M., Hafner, M., and Breu, R. (2007). Model-
driven security engineering for trust management in
SECTET. Journal of Software, 2(1).
Apostolopoulos, V., Peris, V., and Saha, D. (1999). Trans-
port layer security: How much does it really cost? In
Infocom, pages 717–725. IEEE.
Barthe, G., Crespo, J. M., Gr
´
egoire, B., Kunz, C.,
Lakhnech, Y., Schmidt, B., and Zanella-B
´
eguelin, S.
(2013). Fully automated analysis of padding-based
encryption in the computational model. In Computer
& communications security, pages 1247–1260. ACM.
B
´
ezivin, J., Bouzitouna, S., Fabro, M. D. D., Gervais, M.-P.,
Jouault, F., Kolovos, D. S., Kurtev, I., and Paige, R. F.
(2006). A canonical scheme for model composition.
In ECMDA-FA, pages 346–360.
Broy, M. (1997). Compositional refinement of interactive
systems. J. ACM, 44(6):850–891.
Broy, M. and Stølen, K. (2001). Specification and Develop-
ment of Interactive Systems: Focus on Streams, Inter-
faces, and Refinement. Springer.
Brunet, G., Chechik, M., and Uchitel, S. (2006). Properties
of behavioural model merging. In FM, pages 98–114.
Chadha, R., Ciob
ˆ
aca, S., and Kremer, S. (2012). Automated
verification of equivalence properties of cryptographic
protocols. In ESOP, volume 7211, pages 108–127.
Springer.
Devanbu, P. and Stubblebine, S. (2000). Software engineer-
ing for security: A roadmap. In ICSE, pages 227–239.
ACM.
Dolev, D. and Yao, A. C. (1983). On the security of pub-
lic key protocols. IEEE Transactions on Information
Theory, 29(12):198–208.
Meadows, C. (2000). Open issues in formal methods for
cryptographic protocol analysis. In DARPA ISCE, vol-
ume 1, pages 237–250. IEEE.
Meier, S., Schmidt, B., Cremers, C., and Basin, D. (2013).
The tamarin prover for the symbolic analysis of secu-
rity protocols. In CAV, pages 696–701. Springer.
Patel, R., Borisaniya, B., Patel, A., Patel, D. R., Rajarajan,
M., and Zisman, A. (2010). Comparative analysis of
formal model checking tools for security protocol ver-
ification. In CNSA, pages 152–163. Springer.
Paulson, L. C. (1998). The inductive approach to verify-
ing cryptographic protocols. J. Comput. Secur., 6(1-
2):85–128.
Permpoontanalarp, Y. (2010). On-the-fly trace generation
and textual trace analysis and their applications to the
analysis of cryptographic protocols. Formal Tech-
niques for Distributed Systems, pages 201–215.
Ryan, P. and Schneider, S. (2000). The modelling and
analysis of security protocols: the CSP approach.
Addison-Wesley Professional.
Schmidt, B., Meier, S., Cremers, C., and Basin, D. (2012).
Automated analysis of diffie-hellman protocols and
advanced security properties. In CSFS, pages 78–94.
IEEE.
Spichkova, M. (2007). Specification and Seamless Verifi-
cation of Embedded Real-Time Systems: FOCUS on
Isabelle. PhD thesis, TU M
¨
unchen.
Spichkova, M. (2012a). Formal Specification and Verifi-
cation of Cryptographic Properties. Technical report,
TU M
¨
unchen.
Spichkova, M. (2012b). Human Factors of Formal Meth-
ods. In Interfaces and Human Computer Interaction.
IADIS.
Spichkova, M. (2013a). Design of formal languages and
interfaces: formal does not mean unreadable. In
Emerging Research and Trends in Interactivity and the
Human-Computer Interface. IGI Global.
Spichkova, M. (2013b). Stream processing components: Is-
abelle/HOL formalisation and case studies. Archive of
Formal Proofs.
Spichkova, M. (2014). Compositional properties of crypto-
based components. Archive of Formal Proofs.
Spichkova, M. (2016). Spatio-temporal features of Focus
ST
.
arXiv preprint arXiv:1610.07884.
Spichkova, M., Blech, J., Herrmann, P., and Schmidt, H.
(2014). Modeling spatial aspects of safety-critical
systems with Focus
ST
. In MoDeVVa, pages 49–58.
CEUR.
Spichkova, M. and J
¨
urjens, J. (2008). Formal Specifica-
tion of Cryptographic Protocols and Their Composi-
tion Properties: FOCUS-oriented approach. Technical
report, TU M
¨
unchen.
Whittle, J., Wijesekera, D., and Hartong, M. (2008). Exe-
cutable misuse cases for modeling security concerns.
In ICSE, pages 121–130. ACM.
Wimmel, G. (2005). Model-based Development of Security-
Critical Systems. PhD thesis, TU M
¨
unchen.
FocusST Solution for Analysis of Cryptographic Properties
327