Model checkers have been remarkably successful in finding flaws in security protocols. In this paper we present an approach to binding specifications of security protocols to actual implementations and show how it can be effectively used to automatically test implementations against putative attack traces found by the model checker. By using our approach we have been able to automatically detect and reproduce an attack witnessing an authentification flaw in the SAML-based Single Sign-On for Google Apps.
Type:
Conférence
City:
Prague
Date:
2012-05-31
Department:
Sécurité numérique
Eurecom Ref:
3659
Copyright:
© Springer. Personal use of this material is permitted. The definitive version of this paper was published in and is available at : http://dx.doi.org/10.1007/978-3-642-30473-6_3
See also: