A tool for lazy verification of security protocols

被引:10
|
作者
Chevalier, Y [1 ]
Vigneron, L [1 ]
机构
[1] UN2, UHP, LORIA, F-54506 Vandoeuvre Les Nancy, France
关键词
D O I
10.1109/ASE.2001.989832
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We present the lazy strategy implemented in a compiler of cryptographic protocols, Casrul. The purpose of this compiler is to verify protocols and to translate them into rewrite rules that can be used by several kinds of automatic or semi-automatic tools for finding flaws, or proving properties. It is entirely automatic, and the efficiency of the generated rules is guaranteed because of the use of a lazy model of an Intruder behavior This efficiency is illustrated on several examples.
引用
收藏
页码:373 / 376
页数:4
相关论文
共 50 条
  • [41] Security in Wireless Sensor Networks: A formal verification of protocols
    Nandi, Giann Spilere
    Pereira, David
    Vigil, Martin
    Moraes, Ricardo
    Morales, Analucia Schiaffino
    Araujo, Gustavo
    [J]. 2019 IEEE 17TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2019, : 425 - 431
  • [42] A Framework for Formal Verification of Security Protocols in C plus
    Pradeep, R.
    Sunitha, N. R.
    Ravi, V
    Verma, Sushma
    [J]. INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 163 - 175
  • [43] Security Verification of Hardware-enabled Attestation Protocols
    Zhang, Tianwei
    Szefer, Jakub
    Lee, Ruby B.
    [J]. 2012 IEEE/ACM 45TH INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE WORKSHOPS, 2012, : 47 - 54
  • [44] AnBx: Automatic Generation and Verification of Security Protocols Implementations
    Modesti, Paolo
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015), 2016, 9482 : 156 - 173
  • [45] Automatic verification of security in payment protocols for electronic commerce
    Panti, M
    Spalazzi, L
    Tacconi, S
    Valenti, S
    [J]. ENTERPRISE INFORMATION SYSTEMS IV, 2002, : 276 - 282
  • [46] Formal Verification of Security Protocols: the Squirrel Prover (Keynote)
    Delaune, Stephanie
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY, PT I, FPS 2023, 2024, 14551 : XI - XIV
  • [47] Formal Verification of Security Protocols: the Squirrel Prover (Keynote)
    Delaune, Stephanie
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY, PT II, FPS 2023, 2024, 14552 : XI - XIV
  • [48] Automatic Verification for Later-Correspondence of Security Protocols
    Xie, Xiaofei
    Li, Xiaohong
    Liu, Yang
    Li, Li
    Feng, Ruitao
    Feng, Zhiyong
    [J]. STRUCTURED OBJECT-ORIENTED FORMAL LANGUAGE AND METHOD, 2015, 8979 : 111 - 126
  • [49] Formal verification: an imperative step in the design of security protocols
    Coffey, T
    Dojen, R
    Flanagan, T
    [J]. COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2003, 43 (05): : 601 - 618
  • [50] A Formal Specification and Verification Framework for Timed Security Protocols
    Li, Li
    Sun, Jun
    Liu, Yang
    Sun, Meng
    Dong, Jin-Song
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2018, 44 (08) : 725 - 746