SAT-based model-checking of security protocols using planning graph analysis

被引:0
作者
Armando, A [1 ]
Compagna, L [1 ]
Ganty, P [1 ]
机构
[1] Univ Genoa, DIST, I-16145 Genoa, Italy
来源
FME 2003: FORMAL METHODS, PROCEEDINGS | 2003年 / 2805卷
关键词
bounded model-checking; security protocols; SAT-solvers; SAT encodings;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In previous work we showed that automatic SAT-based model-checking techniques based on a reduction of protocol insecurity problems to satisfiability problems in propositional logic (SAT) can be used effectively to find attacks on security protocols. The approach results from the combination of a reduction of protocol insecurity problems to planning problems and well-known SAT-reduction techniques, called linear encodings, developed for planning. Experimental results confirmed the effectiveness of the approach but also showed that the time spent to generate the SAT formula largely dominates the time spent by the SAT solver to check its satisfiability. Moreover, the SAT instances generated by the tool get of unmanageable size on the most complex protocols. In this paper we explore the application of the Graphplan-based encoding technique to the analysis of security protocols and present experimental data showing that Graphplan-based encodings are considerably (i.e. up to 2 orders of magnitude) smaller than linear encodings. These results confirm the effectiveness of the SAT-based approach to the analysis of security protocols and pave the way to its application to large protocols arising in practical applications.
引用
收藏
页码:875 / 893
页数:19
相关论文
共 26 条
  • [11] CHEVALIER Y, 2001, P AUT SOFTW ENG C AS
  • [12] DO MB, 2000, ARTIF INTELL, P308
  • [13] DOLEV D, 1983, IEEE T INFORMATION T, V2
  • [14] Ernst MD, 1997, INT JOINT CONF ARTIF, P1169
  • [15] GIUNCHIGLIA E, 2001, LECT NOTES ARTIF INT, V2083, P347
  • [16] Compiling and verifying security protocols
    Jacquemard, F
    Rusinowitch, M
    Vigneron, L
    [J]. LOGIC FOR PROGRAMMING AND AUTOMATED REASONING, PROCEEDINGS, 2000, 1955 : 131 - 160
  • [17] Kautz H, 1999, IJCAI-99: PROCEEDINGS OF THE SIXTEENTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOLS 1 & 2, P318
  • [18] Kautz H, 1996, MOR KAUF R, P374
  • [19] Lowe G., 1996, Tools and Algorithms for the Construction and Analysis of Systems. Second International Workshop, TACAS '96. Proceedings, P147
  • [20] LOWE H, 2000, PCSFW P 13 COMP SEC