2014 IEEE Symposium on Security and Privacy 2014
DOI: 10.1109/sp.2014.18
|View full text |Cite
|
Sign up to set email alerts
|

Automated Analysis of Security Protocols with Global State

Abstract: Abstract. Security APIs, key servers and protocols that need to keep the status of transactions, require to maintain a global, non-monotonic state, e.g., in the form of a database or register. However, most existing automated verification tools do not support the analysis of such stateful security protocols -sometimes because of fundamental reasons, such as the encoding of the protocol as Horn clauses, which are inherently monotonic. A notable exception is the recent tamarin prover which allows specifying prot… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
29
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 31 publications
(29 citation statements)
references
References 26 publications
0
29
0
Order By: Relevance
“…The grammar for terms (M, N ) and processes (P, Q), given in Table 1, follows [12]. In addition to usual operators for concurrency, replication, and name creation, the calculus A inherits from the applied π-calculus [1] input and output constructs in which terms appear both as communication subjects and objects.…”
Section: Syntax and Semanticsmentioning
confidence: 99%
See 4 more Smart Citations
“…The grammar for terms (M, N ) and processes (P, Q), given in Table 1, follows [12]. In addition to usual operators for concurrency, replication, and name creation, the calculus A inherits from the applied π-calculus [1] input and output constructs in which terms appear both as communication subjects and objects.…”
Section: Syntax and Semanticsmentioning
confidence: 99%
“…This paper connects two distinct formal models of communicating systems: a process language for the analysis of security protocols [12], and a process language for session-based concurrency [9,10]. They are representative of two separate research strands: (a) Process models for security protocols, such as [12] (see also [7]), rely on variants of the applied π-calculus [1] to establish properties related to process execution (e.g., secrecy and confidentiality).…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations