2000
DOI: 10.1145/363516.363528
|View full text |Cite
|
Sign up to set email alerts
|

Verifying security protocols with Brutus

Abstract: Due to the rapid growth of the "Internet" and the "World Wide Web" security has become a very important concern in the design and implementation of software systems. Since security has become an important issue, the number of protocols in this domain has become very large. These protocols are very diverse in nature. If a software architect wants to deploy some of these protocols in a system, they have to be sure that the protocol has the right properties as dictated by the requirements of the system. In this a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
50
0
1

Year Published

2005
2005
2011
2011

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 99 publications
(51 citation statements)
references
References 20 publications
0
50
0
1
Order By: Relevance
“…Finite state analysis of cryptographic protocols can take place in specialized security model checkers, like BRUTUS [6], where security violations are encoded as failures of secrecy or authentication. Alternatively, finite state analysis is often carried out in generalpurpose model checkers like Murφ [31] and the FDR (Failures Divergence Refinement) [32] model checker.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Finite state analysis of cryptographic protocols can take place in specialized security model checkers, like BRUTUS [6], where security violations are encoded as failures of secrecy or authentication. Alternatively, finite state analysis is often carried out in generalpurpose model checkers like Murφ [31] and the FDR (Failures Divergence Refinement) [32] model checker.…”
Section: Related Workmentioning
confidence: 99%
“…When focused on the problem of the state space explosion, a series of interesting works exploit symmetry and partial order reduction techniques [6,7,31,33]. In [10], the authors propose model checking with pre-configuration, which is a divide-and-conquer method for verifying security protocols.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…; see e.g. [16,10,3,6]. Actually, both approaches have strong and weak points: automatic tools are quite successful on particular finite-state systems, but they naturally suffer of state-explosion problems and usually cannot be used for proving general properties.…”
Section: Introductionmentioning
confidence: 99%