Automated formal verification of protocols

被引:0
|
作者
Avresky, DR
Vassilaras, S
机构
关键词
D O I
10.1109/ICCCN.1997.623308
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We adopt a formalism to describe protocols that is close to the human way of thinking and can be easily used to perform reachability analysis of the described protocol in a state-transition format. This formalism allows for can execution tree (ET) to be generated from a set of assertions such that all paths from the root to the leaves are well-defined formulas. We then extend the formalism with regards to real-time properties. Finally, we present a software verification tool, Verify, that implements the above features in the analysis of protocols.
引用
收藏
页码:166 / 169
页数:4
相关论文
共 50 条
  • [21] Formal description and verification of MAS interaction protocols
    Chen, Hongbing
    Yang, Qun
    Li, Qianmu
    Xu, Manwu
    [J]. MULTIAGENT AND GRID SYSTEMS, 2006, 2 (04) : 353 - 363
  • [22] Formal Verification of Consensus Protocols: Survey and Perspective
    Ge, Ning
    He, Yu-Kai
    Zhai, Shu-Mao
    Li, Xiao-Zhou
    Zhang, Li
    [J]. Ruan Jian Xue Bao/Journal of Software, 2023, 34 (11): : 4989 - 5007
  • [23] Formal Verification of e-Reputation Protocols
    Kassem, Ali
    Lafourcade, Pascal
    Lakhnech, Yassine
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, 8930 : 247 - 261
  • [24] Towards the formal verification of electronic commerce protocols
    Bolignano, D
    [J]. 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 133 - 146
  • [25] FORMAL DEFINITION AND VERIFICATION OF PROTOCOLS USING CCS
    KARPOV, JG
    [J]. AVTOMATIKA I VYCHISLITELNAYA TEKHNIKA, 1986, (06): : 21 - 30
  • [26] FORMAL SPECIFICATION AND VERIFICATION OF SECURE COMMUNICATION PROTOCOLS
    KNAPSKOG, SJ
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1990, 453 : 58 - 73
  • [27] Formal Verification of e-Auction Protocols
    Dreier, Jannik
    Lafourcade, Pascal
    Lakhnech, Yassine
    [J]. PRINCIPLES OF SECURITY AND TRUST, POST 2013, 2013, 7796 : 247 - 266
  • [28] Formal automatic verification of authentication cryptographic protocols
    Debbabi, M
    Mejri, M
    Tawbi, N
    Yahmadi, I
    [J]. FIRST IEEE INTERNATIONAL CONFERENCE ON FORMAL ENGINEERING METHODS, PROCEEDINGS, 1997, : 50 - 59
  • [29] On the formal modeling of inductive verification for cryptographical protocols
    Li, Yongjian
    Song, Xiaoyu
    Li, Xiaojuan
    [J]. 2012 13TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS, AND TECHNOLOGIES (PDCAT 2012), 2012, : 201 - 206
  • [30] Formal Verification of Security Protocols Using Spin
    Chen, Shengbo
    Fu, Hao
    Miao, Huaikou
    [J]. 2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2016, : 637 - 642