Casper: A compiler for the analysis of security protocols

被引:103
|
作者
Lowe, G
机构
关键词
D O I
10.1109/CSFW.1997.596779
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
fn recent years, a method for analyzing security protocols wing the process algebra CSP [8] and its model checker FLIR [26] has been developed. This technique has proved successful, and has been used to discover a number of attacks upon protocols. However, the technique has required producing a CSP description of the protocol by hand; this has proved tedious and error-prone. In this paper we describe Gasper, a program that automatically produces the CSP description from a more abstract description, thus greatly simplifying the modelling and analysis process.
引用
收藏
页码:18 / 30
页数:13
相关论文
共 50 条
  • [1] Formal Security Analysis of NFC M-coupon Protocols using Casper/FDR
    Alshehri, Ali
    Briffa, Johann A.
    Schneider, Steve
    Wesemeyer, Stephan
    [J]. 2013 5TH INTERNATIONAL WORKSHOP ON NEAR FIELD COMMUNICATION (NFC), 2013, : 25 - 30
  • [2] CVS: a compiler for the analysis of cryptographic protocols
    Durante, A
    Focardi, R
    Gorrieri, R
    [J]. PROCEEDINGS OF THE 12TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, 1999, : 203 - 212
  • [3] Automatic generation of the C# code for security protocols verified with casper/FDR
    Jeon, CW
    Kim, IG
    Choi, JY
    [J]. AINA 2005: 19th International Conference on Advanced Information Networking and Applications, Vol 2, 2005, : 507 - 510
  • [4] Analysis of security protocols
    Durgin, NA
    Mitchell, JC
    [J]. CALCULATIONAL SYSTEM DESIGN, 1999, 173 : 369 - 394
  • [5] Web GUI for Automating the Formal Verification of Security Protocols using Casper & FDR4
    Scurtu, Andreea
    Pura, Mihai-Lica
    [J]. PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE (ECAI-2019), 2019,
  • [6] Formal Security Analysis of EAP-ERP Using Casper
    Ramezani, Khosrow
    Sithirasenan, Elankayer
    Su, Kaile
    [J]. IEEE ACCESS, 2016, 4 : 383 - 396
  • [7] Timed analysis of security protocols
    Corin, R.
    Etalle, S.
    Hartel, P.
    Mader, A.
    [J]. JOURNAL OF COMPUTER SECURITY, 2007, 15 (06) : 619 - 645
  • [8] A decidable analysis of security protocols
    Rusinowitch, M
    [J]. EXPLORING NEW FRONTIERS OF THEORETICAL INFORMATICS, 2004, 155 : 21 - 21
  • [9] Timed Analysis of Security Protocols
    Szymoniak, Sabina
    Siedlecka-Lamch, Olga
    Kurkowski, Miroslaw
    [J]. INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY - ISAT 2016 - PT II, 2017, 522 : 53 - 63
  • [10] Formal method for the analysis of security protocols
    Lu, Laifeng
    Ma, Jianfeng
    [J]. ICIC Express Letters, 2011, 5 (10): : 3785 - 3789