2005
DOI: 10.1007/s10207-004-0055-7
|View full text |Cite
|
Sign up to set email alerts
|

OFMC: A symbolic model checker for security protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
288
0
2

Year Published

2007
2007
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 401 publications
(291 citation statements)
references
References 40 publications
1
288
0
2
Order By: Relevance
“…It not only allows reasoning about the high-level security property, abstracting from the low-level details of the cryptographic implementation, but it also helps to reduce the problem to a size that can be handled efficiently by automatic verification tools [7,8,9,10].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…It not only allows reasoning about the high-level security property, abstracting from the low-level details of the cryptographic implementation, but it also helps to reduce the problem to a size that can be handled efficiently by automatic verification tools [7,8,9,10].…”
Section: Introductionmentioning
confidence: 99%
“…-it works for an entire protocol suite (more than 40) and not just on few examples. The suite includes complex protocols like SET, iKP, Kerberos, ISO H530, Google SSO and others, many of them derived from the AnB examples included in the OFMC model-checker [8].…”
Section: Introductionmentioning
confidence: 99%
“…In particular, many algorithms and tools (see [13,4,9,2,11] to cite a few) have been designed to automatically find flaws in protocols or prove security. Most of these results focus on reachability properties such as authentication or secrecy: for any execution of the protocol, an attacker should never learn a secret (secrecy property) or make Alice think she's talking to Bob while Bob did not engage a conversation with her (authentication property).…”
Section: Introductionmentioning
confidence: 99%
“…All these examples are evidences that relaxing the perfect encryption hypothesis by considering equational theories is an important issue in security. In order to achieve this goal some tools have been developed for considering some algebraic properties [7,8,20,25,26,44].…”
Section: Introductionmentioning
confidence: 99%