A calculus for control flow analysis of security protocols

被引:0
|
作者
Mikael Buchholtz
Hanne Riis Nielson
Flemming Nielson
机构
[1] Technical University of Denmark,Informatics and Mathematical Modelling
关键词
Security protocols; Cryptographic protocols; Process calculi; Static analysis; Flow logic;
D O I
10.1007/s10207-004-0036-x
中图分类号
学科分类号
摘要
The design of a process calculus for analysing security protocols is governed by three factors: expressing the security protocol in a precise and faithful manner, accommodating the variety of attack scenarios, and utilising the strengths (and limit the weaknesses) of the underlying analysis methodology. We pursue an analysis methodology based on control flow analysis in flow logic style, whose ability to analyse a variety of security protocols we have shown previously [7]. This paper develops a calculus, LySans, which allows for much greater control and clarity in the description of attack scenarios, gives a more flexible format for expressing protocols, and at the same time allows one to circumvent some of the ‘false positives’ arising in [7].
引用
收藏
页码:145 / 167
页数:22
相关论文
共 50 条
  • [31] Bioinspired Security Analysis of Wireless Protocols
    Petrocchi, Marinella
    Spognardi, Angelo
    Santi, Paolo
    [J]. MOBILE NETWORKS & APPLICATIONS, 2016, 21 (01): : 139 - 148
  • [32] Security issues in control, management and routing protocols
    Baltatu, M
    Lioy, A
    Maino, F
    Mazzocchi, D
    [J]. COMPUTER NETWORKS, 2000, 34 (06) : 881 - 894
  • [33] A method for symbolic analysis of security protocols
    Boreale, M
    Buscemi, MG
    [J]. THEORETICAL COMPUTER SCIENCE, 2005, 338 (1-3) : 393 - 425
  • [34] A Critical Analysis of RFID Security Protocols
    Sharif, Atif
    Potdar, Vidyasagar
    [J]. 2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 1357 - 1362
  • [35] A type and effect analysis of security protocols
    Gordon, AD
    Jeffrey, A
    [J]. STATIC ANALYSIS, PROCEEDINGS, 2001, 2126 : 432 - 432
  • [36] Casper: A compiler for the analysis of security protocols
    Lowe, G
    [J]. 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 18 - 30
  • [37] Formal analysis of modern security protocols
    Yasinsac, A
    Childs, J
    [J]. INFORMATION SCIENCES, 2005, 171 (1-3) : 189 - 211
  • [38] A Hybrid Analysis for Security Protocols with State
    Ramsdell, John D.
    Dougherty, Daniel J.
    Guttman, Joshua D.
    Rowe, Paul D.
    [J]. INTEGRATED FORMAL METHODS, IFM 2014, 2014, 8739 : 272 - 287
  • [39] Bioinspired Security Analysis of Wireless Protocols
    Marinella Petrocchi
    Angelo Spognardi
    Paolo Santi
    [J]. Mobile Networks and Applications, 2016, 21 : 139 - 148
  • [40] Analysis of security protocols as open systems
    Martinelli, F
    [J]. THEORETICAL COMPUTER SCIENCE, 2003, 290 (01) : 1057 - 1106