A tool for lazy verification of security protocols

被引:10
|
作者
Chevalier, Y [1 ]
Vigneron, L [1 ]
机构
[1] UN2, UHP, LORIA, F-54506 Vandoeuvre Les Nancy, France
关键词
D O I
10.1109/ASE.2001.989832
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We present the lazy strategy implemented in a compiler of cryptographic protocols, Casrul. The purpose of this compiler is to verify protocols and to translate them into rewrite rules that can be used by several kinds of automatic or semi-automatic tools for finding flaws, or proving properties. It is entirely automatic, and the efficiency of the generated rules is guaranteed because of the use of a lazy model of an Intruder behavior This efficiency is illustrated on several examples.
引用
收藏
页码:373 / 376
页数:4
相关论文
共 50 条
  • [1] SeVe: automatic tool for verification of security protocols
    Anh Tuan Luu
    Sun, Jun
    Liu, Yang
    Dong, Jin Song
    Li, Xiaohong
    Thanh Tho Quan
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2012, 6 (01) : 57 - 75
  • [2] SeVe: automatic tool for verification of security protocols
    Anh Tuan Luu
    Jun Sun
    Yang Liu
    Jin Song Dong
    Xiaohong Li
    Thanh Tho Quan
    [J]. Frontiers of Computer Science, 2012, 6 : 57 - 75
  • [3] HERMES:: An automatic tool for verification of secrecy in security protocols
    Bozga, L
    Lakhnech, Y
    Périn, M
    [J]. COMPUTER AIDED VERIFICATION, 2003, 2725 : 219 - 222
  • [4] The Scyther tool: Verification, falsification, and analysis of security protocols
    Cremers, Cas J. F.
    [J]. COMPUTER AIDED VERIFICATION, 2008, 5123 : 414 - 418
  • [5] Verification of Security Protocols
    Cortier, Veronique
    [J]. VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION, 2009, 5403 : 5 - 13
  • [6] Lazy Self-composition for Security Verification
    Yang, Weikun
    Vizel, Yakir
    Subramanyan, Pramod
    Gupta, Aarti
    Malik, Sharad
    [J]. COMPUTER AIDED VERIFICATION, CAV 2018, PT II, 2018, 10982 : 136 - 156
  • [7] Verification of randomized security protocols
    Chadha, Rohit
    Sistla, A. Prasad
    Viswanathan, Mahesh
    [J]. 2017 32ND ANNUAL ACM/IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE (LICS), 2017,
  • [8] Generic verification of security protocols
    Khan, AS
    Mukund, M
    Suresh, SP
    [J]. MODEL CHECKING SOFTWARE, PROCEEDINGS, 2005, 3639 : 221 - 235
  • [9] Educating Cryptography using Formal Security Verification tool for Cryptographic Protocols.
    Okazaki H.
    Shimura S.
    Miyamoto T.
    Watanabe T.
    Murakami Y.
    Futa Y.
    [J]. Computer Software, 2020, 37 (01) : 99 - 113
  • [10] Automated Verification of Accountability in Security Protocols
    Kuennemann, Robert
    Esiyok, Ilkan
    Backes, Michael
    [J]. 2019 IEEE 32ND COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2019), 2019, : 397 - 413