Skip to Main content Skip to Navigation
Preprints, Working Papers, ...

Model Checking the IKEv2 Protocol Using Spin

Abstract : Previous analyses of IKEv2 concluded that the protocol was suffering from two authentication vulnerabilities: the penultimate authentication flaw and a vulnerability that leads to a reflection attack. In this paper we analyze the IKEv2 protocol specification using the Spin model checker. To do so we extend and improve an existing modeling method that allows analyzing security protocols using Spin. For completeness we indicate each abstraction we make when writing the model. As a result we show that the reflection attack is actually not applicable. We further discuss two modifications of the protocol that we prove to be effective against the penultimate authentication flaw.
Complete list of metadata

Cited literature [24 references]  Display  Hide  Download
Contributor : Tristan Ninet Connect in order to contact the contributor
Submitted on : Friday, March 8, 2019 - 4:58:40 PM
Last modification on : Tuesday, October 19, 2021 - 11:04:35 AM
Long-term archiving on: : Monday, June 10, 2019 - 9:27:20 AM


Files produced by the author(s)


  • HAL Id : hal-02062292, version 1


Tristan Ninet, Axel Legay, Romaric Maillard, Louis-Marie Traonouez, Olivier Zendra. Model Checking the IKEv2 Protocol Using Spin. 2019. ⟨hal-02062292v1⟩



Record views


Files downloads