There is an increasing need to study the vulnerability of communication protocols in distributed systems to malicious attacks that attempt to violate safety or liveness properties. In this paper, we propose a general methodology for formal synthesis of successful attacks against protocols where the attacker always eventually wins, called For-all attacks. This generalizes previous work on the synthesis of There-exists attacks, where the attacker can sometimes win. As we model protocols and system architectures by finite-state automata, our methodology employs the supervisory control theory of discrete event systems, which is well suited to pose and the synthesis of For-all attacks where the attacker has partial observability and controllability of the system events. We demonstrate our methodology using examples of man-in-the-middle attacks against the Alternating Bit Protocol and the Transmission Control Protocol.
翻译:越来越需要研究分布式系统中通信协议在恶意攻击中的脆弱性,这些恶意攻击企图破坏安全或生命特性。在本文中,我们提出了一个对攻击者最终总是胜出的、称为 " 全方位攻击 " 的议定书的成功攻击进行正式综合的一般方法。这概括了以前关于 " 存在性攻击 " 综合工作的工作,攻击者有时可以赢。我们用有限状态自动自动数据模拟协议和系统结构时,我们的方法采用了独立事件系统的监督控制理论,这种理论非常适合提出,并且综合了攻击者部分可耐性和可控制系统事件的所有攻击。我们用中间人攻击《改变比特议定书》和《传输控制议定书》的例子展示了我们的方法。