Verifying security protocols: An application of CSP

被引:0
|
作者
Schneider, S [1 ]
Delicata, R [1 ]
机构
[1] Univ Surrey, Dept Comp, Guildford GU2 5XH, Surrey, England
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The field of protocol analysis is one area in which CSP has proven particularly successful, and several techniques have been proposed that use CSP to reason about security properties such as confidentiality and authentication. In this paper we describe one such approach, based on theorem-proving, that uses the idea of a rank function to establish the correctness of protocols. This description is motivated by the consideration of a simple, but flawed, authentication protocol. We show how a rank function analysis can be used to locate this flaw and prove that a modified version of the protocol is correct.
引用
收藏
页码:243 / 263
页数:21
相关论文
共 50 条
  • [1] Verifying authentication protocols in CSP
    Schneider, S
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1998, 24 (09) : 741 - 758
  • [2] Verifying authentication protocols with CSP
    Schneider, S
    [J]. 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 3 - 17
  • [3] Compiling and verifying security protocols
    Jacquemard, F
    Rusinowitch, M
    Vigneron, L
    [J]. LOGIC FOR PROGRAMMING AND AUTOMATED REASONING, PROCEEDINGS, 2000, 1955 : 131 - 160
  • [4] Verifying security protocols with Brutus
    Clarke, EM
    Jha, S
    Marrero, W
    [J]. ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2000, 9 (04) : 443 - 487
  • [5] Verifying layered security protocols
    Gibson-Robinson, Thomas
    Kamil, Allaa
    Lowe, Gavin
    [J]. JOURNAL OF COMPUTER SECURITY, 2015, 23 (03) : 259 - 307
  • [6] Verifying the independence of security protocols
    Bela, Genge
    Ignat, Iosif
    [J]. ICCP 2007: IEEE 3RD INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING, PROCEEDINGS, 2007, : 155 - +
  • [7] Verifying security protocols by knowledge analysis
    School of Systems Engineering, The University of Reading, Reading, United Kingdom
    不详
    不详
    [J]. Int. J. Secur. Netw, 2008, 3 (183-192): : 183 - 192
  • [8] Verifying Parameterized Timed Security Protocols
    Li, Li
    Sun, Jun
    Liu, Yang
    Dong, Jin Song
    [J]. FM 2015: FORMAL METHODS, 2015, 9109 : 342 - 359
  • [9] TAuth: Verifying Timed Security Protocols
    Li, Li
    Sun, Jun
    Liu, Yang
    Dong, Jin Song
    [J]. FORMAL METHODS AND SOFTWARE ENGINEERING, ICFEM 2014, 2014, 8829 : 300 - 315
  • [10] Verifying Implementations of Security Protocols by Refinement
    Polikarpova, Nadia
    Moskal, Michal
    [J]. VERIFIED SOFTWARE: THEORIES, TOOLS, EXPERIMENTS, 2012, 7152 : 50 - +