2005
DOI: 10.1007/11580850_4
|View full text |Cite
|
Sign up to set email alerts
|

Model–Based Testing of Cryptographic Protocols

Abstract: Abstract. Modeling is a popular way of representing the behavior of a system. A very useful type of model in computing is an abstract state machine which describes transitions over first order structures. The general purpose model-based testing tool SpecExplorer (used within Microsoft, also available externally) uses such a model, written in AsmL or Spec#, to perform a search that checks that all reachable states of the model are safe, and also to check conformance of an arbitrary .NET implementation to the mo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2007
2007
2018
2018

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…Despite the title, the paper [17] is not really about model-based testing of cryptographic protocols in our usage of the term "model-based testing" (i.e., generate test-sequences from models) but rather about soundness and completeness of symbolic models of cryptographic protocols with respect to computational complexity models, and about using the SpecExplorer for model-checking Spec-sharp models of cryptographic protocols. The approach proposed in [15] deals with the problem of establishing whether or not a security property expressed using an observer formalised as an input/output labelled transition system (IOLTS) holds in an IOLTS providing a black-box specification of the system.…”
Section: Related Workmentioning
confidence: 98%
“…Despite the title, the paper [17] is not really about model-based testing of cryptographic protocols in our usage of the term "model-based testing" (i.e., generate test-sequences from models) but rather about soundness and completeness of symbolic models of cryptographic protocols with respect to computational complexity models, and about using the SpecExplorer for model-checking Spec-sharp models of cryptographic protocols. The approach proposed in [15] deals with the problem of establishing whether or not a security property expressed using an observer formalised as an input/output labelled transition system (IOLTS) holds in an IOLTS providing a black-box specification of the system.…”
Section: Related Workmentioning
confidence: 98%
“…Nonce can be generated in many ways but for the proposed solution pseudo random nonce is recommended so that nonce for upcoming packets cannot be predicted. Nonce generation is a separate research issue and is explained in [9].…”
Section: Noncementioning
confidence: 99%
“…Rosenzweig, Runje, and Schulte explained this abstraction process, 'experiments as structures', and argued for its faithfulness in [16]. They showed how the Dolev-Yao intruder model fits into Spec Explorer.…”
Section: Model-based Testing Of Cryptographic Protocolsmentioning
confidence: 99%
“…Here we highlight Professor Rosenzweig's contributions to modeling, analysis, and testing of network security protocols [14] - [16], and his work on information technology used in the Zagreb Stock Exchange. His work on program specification and verification, evolving algebras, and abstract state machines [1]- [13] and [17]- [19] is described in eloquent tributes by Egon Börger [20] and Yuri Gurevich [21].…”
Section: Dean Rosenzweig (1949 -2007)mentioning
confidence: 99%