2001
DOI: 10.3233/jcs-2001-91-203
|View full text |Cite
|
Sign up to set email alerts
|

Athena: a novel approach to efficient automatic security protocol analysis1

Abstract: We propose a new efficient automatic verification technique, Athena, for security protocol analysis. It uses a new efficient representation -our extension to the Strand Space Model, and utilizes techniques from both model checking and theorem proving approaches. Athena is fully automatic and is able to prove the correctness of many security protocols with arbitrary number of concurrent runs. The run time for a typical protocol from the literature, like the Needham-Schroeder protocol, is often a fraction of a s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
108
0
3

Year Published

2002
2002
2014
2014

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 145 publications
(111 citation statements)
references
References 26 publications
0
108
0
3
Order By: Relevance
“…A wide variety of model-checking approaches have been developed for analyzing security protocols, e.g. [1,12,28,41,43,48,49]. The key challenge they face is that the general security problem is undecidable [29], and even semialgorithms, focused on falsification, must come to terms with the enormous branching factor in the search space resulting from using the standard Dolev-Yao intruder model, where the intruder can say infinitely many different things at any time point.…”
Section: Introductionmentioning
confidence: 99%
“…A wide variety of model-checking approaches have been developed for analyzing security protocols, e.g. [1,12,28,41,43,48,49]. The key challenge they face is that the general security problem is undecidable [29], and even semialgorithms, focused on falsification, must come to terms with the enormous branching factor in the search space resulting from using the standard Dolev-Yao intruder model, where the intruder can say infinitely many different things at any time point.…”
Section: Introductionmentioning
confidence: 99%
“…Here we follow the approach of restricting the number of states to be considered in the verification of the protocol, as for instance in (Escobar et al 2011;Song et al 2001;Armando and Compagna 2008). Roughly, we shall cut the messages generated of length greater than a given κ, thus allowing us to model a bounded version of the attacker.…”
Section: Verification Of Security Protocolsmentioning
confidence: 99%
“…Like the large majority of similar tools before it [18,20,21,[23][24][25], Expi2Java targets the Java programming language. This has many pragmatic advantages for building a usable and secure tool: from type and memory safety, an extensive standard library and the cryptographic service provider architecture, to the ease of integrating the generated code into existing applications.…”
Section: Lessons Learnedmentioning
confidence: 99%