2010
DOI: 10.1007/978-3-642-13464-7_16
|View full text |Cite
|
Sign up to set email alerts
|

On-the-Fly Trace Generation and Textual Trace Analysis and Their Applications to the Analysis of Cryptographic Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
9
0

Year Published

2011
2011
2014
2014

Publication Types

Select...
3
1
1

Relationship

3
2

Authors

Journals

citations
Cited by 7 publications
(10 citation statements)
references
References 28 publications
1
9
0
Order By: Relevance
“…We implement our methodology in Coloured Petri Nets (CPN) [32] and use its model checker tool called CPNTools [33] to do the experimental analysis. Our preliminary results were reported previously [36]- [38].…”
Section: Introductionsupporting
confidence: 86%
See 1 more Smart Citation
“…We implement our methodology in Coloured Petri Nets (CPN) [32] and use its model checker tool called CPNTools [33] to do the experimental analysis. Our preliminary results were reported previously [36]- [38].…”
Section: Introductionsupporting
confidence: 86%
“…Recently, we proposed a very simple but practical Petri nets-based model checking methodology for the analysis of cryptographic protocols, which overcomes this limitation [39]. Our methodology offers an efficient analysis of all attack traces, and is essentially independent of model checking tools for the full and explicit state space analysis.…”
Section: Introductionmentioning
confidence: 99%
“…Our CPN method here is based on the CPN approaches that we have developed earlier in [17,20]. There are fIve steps.…”
Section: A Our Methodologymentioning
confidence: 99%
“…Recently in [16][17][18][19][20], our group has developed a new CPN method to analyze cryptographic protocols. Our methodology offers an efficient analysis of multiple attack traces, and is essentially independent of model checking tools for the full and explicit state space analysis.…”
Section: Introductionmentioning
confidence: 99%
“…For TMN protocol, we found two new multi-session attacks. This paper is an extended version of our previous works [45,39,40,41] in that here we formalize our on-the-fly method, provide an analysis of our method and discover more new attacks in both Micali's ECS1 and Bao's modified ECS1. In addition, in this paper we discuss more details of three issues which are our CPN model for TMN, a performance analysis of our method for ECS1 and comparisons between our method and existing works.…”
Section: Introductionmentioning
confidence: 99%