2002
DOI: 10.1007/3-540-45789-5_24
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Constraint-Based System for the Verification of Security Protocols

Abstract: We propose a constraint-based system for the verification of security protocols that improves upon the one developed by Millen and Shmatikov [30]. Our system features (1) a significantly more efficient implementation, (2) a monotonic behavior, which also allows to detect flaws associated to partial runs and (3) a more expressive syntax, in which a principal may also perform explicit checks. In this paper we also show why these improvements yield a more effective and practical system.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
64
0

Year Published

2005
2005
2010
2010

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 60 publications
(64 citation statements)
references
References 36 publications
0
64
0
Order By: Relevance
“…In this definition, we incorporate an optimization that we call step-compression, which is based on the idea [1,11,20,25,41] that we can identify the intruder and the network: every message sent by an honest agent is received by the intruder and every message received by an honest agent comes from the intruder. More specifically, we compose (or "compress") several steps: when the intruder sends a message, an agent reacts to it according to the agent's rules, and the intruder intercepts the agent's answer.…”
Section: The Semantics Of the Intermediate Formatmentioning
confidence: 99%
“…In this definition, we incorporate an optimization that we call step-compression, which is based on the idea [1,11,20,25,41] that we can identify the intruder and the network: every message sent by an honest agent is received by the intruder and every message received by an honest agent comes from the intruder. More specifically, we compose (or "compress") several steps: when the intruder sends a message, an agent reacts to it according to the agent's rules, and the intruder intercepts the agent's answer.…”
Section: The Semantics Of the Intermediate Formatmentioning
confidence: 99%
“…We have used the protocol verifier CoProVe [9] to verify Protocol A. Basically, what we needed to verify is that a malicious application would not be able to obtain the license without the correct intervention of the token.…”
Section: Formal Protocol Verificationmentioning
confidence: 99%
“…Over the last decades many automatic tools based on formal analysis techniques have been presented for verifying cryptographic protocols [2,8,11,14,18,29,31,33,40,20]. All these tools use the so-called Dolev-Yao intruder model.…”
Section: Introductionmentioning
confidence: 99%