Proceedings of the 2005 Workshop on Issues in the Theory of Security 2005
DOI: 10.1145/1045405.1045413
|View full text |Cite
|
Sign up to set email alerts
|

Formal prototyping in early stages of protocol design

Abstract: Network protocol design is usually an informal process where debugging is based on successive iterations of a prototype implementation. The feedback provided by a prototype can be indispensable since the requirements are often incomplete at the start. A drawback of this technique is that errors in protocols can be notoriously difficult to detect by testing alone. Applying formal methods such as theorem proving can greatly increase one's confidence that the protocol is correct. However, formal methods can be te… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2005
2005
2015
2015

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 15 publications
(17 citation statements)
references
References 26 publications
0
17
0
Order By: Relevance
“…If the attack is not found, then the search or model checking command is repeated for the maxActions/duration-pair (2, 4). And so the process continues with the pairs (3, 3), (2,5), (3,4), (4,3), (2,6), . .…”
Section: A Complete Analysis Methods For Non-zeno Intrudersmentioning
confidence: 99%
See 1 more Smart Citation
“…If the attack is not found, then the search or model checking command is repeated for the maxActions/duration-pair (2, 4). And so the process continues with the pairs (3, 3), (2,5), (3,4), (4,3), (2,6), . .…”
Section: A Complete Analysis Methods For Non-zeno Intrudersmentioning
confidence: 99%
“…Another advantage of our approach compared to using domain-specific crypto-analysis tools is that we can include the cryptographic protocol as a part of a larger system, or in combination with other kinds of protocols, and that we can model much larger and complex protocols for which Maude has proved useful in the untimed setting [5]. Furthermore, our tool allows simulation for prototyping purposes, and provides expressive analysis features to allow model checking of a wide range of properties beyond just reachability properties.…”
Section: Time-bounded Ltl Model Checking Can Be Usedmentioning
confidence: 99%
“…There has been a large body of work on verifying the correctness of various network protocol design and implementations using proof-based and model-checking techniques [5,16,13]. The program logic presented here is customized to proving safety properties of SANDLog programs, and may not be expressive enough to verify complex correctness properties.…”
Section: Related Workmentioning
confidence: 99%
“…In addition to our use of Maude for analyzing BGP instances, there is also a huge literature of using Maude for other complex systems, such as security protocols [11] , real-time systems [20], and active networking [5].…”
Section: Related Workmentioning
confidence: 99%