User Identification Procedures with Human Mutations: Formal Analysis and Pilot Study

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

30 Downloads (Pure)

Abstract

User identification procedures, essential to the information security of systems, enable system-user interactions by exchanging data through communication links and interfaces to validate and confirm user authenticity. However, human errors can introduce vulnerabilities that may disrupt the intended identification workflow and thus impact system behavior. Therefore, ensuring the integrity of these procedures requires accounting for such erroneous behaviors. We follow a formal, human-centric approach to analyze user identification procedures by modeling them as security ceremonies and apply proven techniques for automatically analyzing such ceremonies. The approach relies on mutation rules to model potential human errors that deviate from expected interactions during the identification process, and is implemented as the X-Men tool, an extension of the Tamarin prover, which automatically generates models with human mutations and implements matching mutations to other ceremony participants for analysis. As a proof-of-concept, we consider a real-life pilot study involving an AI-driven, virtual receptionist kiosk for
authenticating visitors.
Original languageEnglish
Title of host publicationICSA 2025 Companion proceedings
PublisherIEEE Xplore
Number of pages10
Publication statusAccepted/In press - 20 Jan 2025

Fingerprint

Dive into the research topics of 'User Identification Procedures with Human Mutations: Formal Analysis and Pilot Study'. Together they form a unique fingerprint.

Cite this