2005
DOI: 10.3233/jcs-2005-13302
|View full text |Cite
|
Sign up to set email alerts
|

Static validation of security protocols

Abstract: We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew Secure RPC, Needham-Schroeder asymmetric key, and Beller-C… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
79
0

Year Published

2005
2005
2010
2010

Publication Types

Select...
7
1

Relationship

4
4

Authors

Journals

citations
Cited by 87 publications
(80 citation statements)
references
References 79 publications
(99 reference statements)
1
79
0
Order By: Relevance
“…We refer to [2] [4] for a detailed description of the semantics. Notice that a substitution P[n 1 → n 2 ] substitutes all the free occurrences of n 1 in P for n 2 .…”
Section: Examplementioning
confidence: 99%
See 2 more Smart Citations
“…We refer to [2] [4] for a detailed description of the semantics. Notice that a substitution P[n 1 → n 2 ] substitutes all the free occurrences of n 1 in P for n 2 .…”
Section: Examplementioning
confidence: 99%
“…LYSA [2] is a process calculus in the π-calculus tradition that models security protocols on a global network. It incorporates pattern matching into the language constructs where values can become bound to variables.…”
Section: Lysamentioning
confidence: 99%
See 1 more Smart Citation
“…[6,7]), but it is an interesting case study, because it proves troublesome for many analyses. In particular, independent attribute analyses, such as [8], will yield false positives for Yahalom, in the presence of several principals.…”
Section: Worked Examplementioning
confidence: 99%
“…We use a polyadic π-calculus, pπ, extended with pattern matching in input prefixes (as in [2]) in order to write down the accident service formally (Table 1). For analysis purposes, action prefixes are annotated with labels.…”
Section: The Accident Servicementioning
confidence: 99%