A calculus for control flow analysis of security protocols

被引:0
|
作者
Mikael Buchholtz
Hanne Riis Nielson
Flemming Nielson
机构
[1] Technical University of Denmark,Informatics and Mathematical Modelling
关键词
Security protocols; Cryptographic protocols; Process calculi; Static analysis; Flow logic;
D O I
10.1007/s10207-004-0036-x
中图分类号
学科分类号
摘要
The design of a process calculus for analysing security protocols is governed by three factors: expressing the security protocol in a precise and faithful manner, accommodating the variety of attack scenarios, and utilising the strengths (and limit the weaknesses) of the underlying analysis methodology. We pursue an analysis methodology based on control flow analysis in flow logic style, whose ability to analyse a variety of security protocols we have shown previously [7]. This paper develops a calculus, LySans, which allows for much greater control and clarity in the description of attack scenarios, gives a more flexible format for expressing protocols, and at the same time allows one to circumvent some of the ‘false positives’ arising in [7].
引用
收藏
页码:145 / 167
页数:22
相关论文
共 50 条
  • [1] A Calculus for the Analysis of Wireless Network Security Protocols
    Ballardin, Francesco
    Merro, Massimo
    [J]. FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 206 - 222
  • [2] A simple process calculus for the analysis of security protocols
    Gu, YG
    Fu, YX
    Li, GQ
    [J]. PDCAT 2005: Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, Proceedings, 2005, : 110 - 114
  • [3] Control Flow Analysis for the π-calculus
    Bodei, C
    Degano, P
    Nielson, F
    Nielson, HR
    [J]. CONCUR'98: CONCURRENCY THEORY, 1998, 1466 : 84 - 98
  • [4] Control Flow Analysis for the Join Calculus
    Calvert, Peter
    Mycroft, Alan
    [J]. STATIC ANALYSIS, SAS 2012, 2012, 7460 : 181 - 197
  • [5] Control Flow Analysis for SF Combinator Calculus
    Lester, Martin
    [J]. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2015, (199): : 51 - 67
  • [6] LπCET: A Logic Security Analysis for Cryptographic Protocols Based on π-Calculus Extension Theory
    Wu, Fusheng
    Liu, Jinhui
    Li, Yanbin
    Ni, Mingtao
    [J]. IET INFORMATION SECURITY, 2024, 2024
  • [7] Signal-flow-based analysis of wireless security protocols
    Capar, Cagatay
    Goeckel, Dennis
    Paterson, Kenneth G.
    Quaglia, Elizabeth A.
    Towsley, Don
    Zafer, Murtaza
    [J]. INFORMATION AND COMPUTATION, 2013, 226 : 37 - 56
  • [8] Analysis of security protocols
    Durgin, NA
    Mitchell, JC
    [J]. CALCULATIONAL SYSTEM DESIGN, 1999, 173 : 369 - 394
  • [9] A control-flow analysis for a calculus of concurrent objects
    Di Blasio, P
    Fisher, K
    Talcott, C
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2000, 26 (07) : 617 - 634
  • [10] The Analysis of Threats to Information Security of Protocols and Lighting Control Systems
    Ivliyev, S. N.
    Krylova, S. L.
    Shikov, S. A.
    [J]. MORDOVIA UNIVERSITY BULLETIN, 2018, 28 (01): : 85 - 94