Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
DOI: 10.1109/enabl.1997.630823
|View full text |Cite
|
Sign up to set email alerts
|

From protocol specifications to flaws and attack scenarios: an automatic and formal algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
16
0

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(16 citation statements)
references
References 4 publications
0
16
0
Order By: Relevance
“…We express by M ⊒ m the fact ∃m ′ ∈ M. m ′ ⊒ m + Let p be a protocol, we denote by R G (p) the set of the generalized roles of p. A generalized role is a protocol abstraction where the emphasis is put on a specific agent and where every unknown message by that agent and on which he cannot perform any verification is replaced by a variable. Further details on the role-based specification are available in [12]- [14]. We denote by M G p the set of messages (ground terms and terms with variables) generated by R G (p), by M p the set of messages that are ground terms generated by substitution in the messages of M G p .…”
Section: Notationsmentioning
confidence: 99%
“…We express by M ⊒ m the fact ∃m ′ ∈ M. m ′ ⊒ m + Let p be a protocol, we denote by R G (p) the set of the generalized roles of p. A generalized role is a protocol abstraction where the emphasis is put on a specific agent and where every unknown message by that agent and on which he cannot perform any verification is replaced by a variable. Further details on the role-based specification are available in [12]- [14]. We denote by M G p the set of messages (ground terms and terms with variables) generated by R G (p), by M p the set of messages that are ground terms generated by substitution in the messages of M G p .…”
Section: Notationsmentioning
confidence: 99%
“…An exponent i (the session identifier) is added to each fresh message to emphasize that these components change their values from one run to another. More details about the role-based specification are in [15]- [18]. + A valid trace is an interleaving of instantiated generalized roles where each message sent by the intruder can be produced by her using her capacity and the previous received messages.…”
Section: A Notationsmentioning
confidence: 99%
“…In [11]- [14], Houmani et al proposed universal functions, named interpretation functions, as metrics to calculate the security of messages. These functions are based on selections under the protection of the direct key of encryption and operate in a role-based specification [15]- [18]. An interpretation function must satisfy to some conditions before being certified reliable for protocol analysis.…”
Section: Introductionmentioning
confidence: 99%
“…If a protocol is designed that way, we can conclude that it is secure with respect to confidentiality. A witness-function bases its calculation fully on the static part of a message (static neighborhood) in a role-based specification [26], [33], [34] and ignores the dynamic one (dynamic neighborhood) by construction. It provides two elegant and practical bounds that enable to analyze a protocol on an unbounded number of sessions and with no restriction on the size of valid traces.…”
Section: Introductionmentioning
confidence: 99%