Automatic testing equivalence verification of spi calculus specifications

被引:37
作者
Durante, L [1 ]
Sisto, R [1 ]
Valenzano, A [1 ]
机构
[1] Politecn Torino, CNR, Ist Elettron & Ingn Informaz & Telecomunicaz, I-10129 Turin, Italy
关键词
languages; security; verification; cryptographic protocols; equivalence verification; state space exploration;
D O I
10.1145/941566.941570
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Testing equivalence is a powerful means for expressing the security properties of cryptographic protocols, but its formal verification is a difficult task because of the quantification over contexts on which it is based. Previous articles have provided insights into using theorem-proving for the verification of testing equivalence of spi calculus specifications. This article addresses the same verification problem, but uses a state exploration approach. The verification technique is based on the definition of an environment-sensitive, labeled transition system representing a spi calculus specification. Trace equivalence defined on such a transition system coincides with testing equivalence. Symbolic techniques are used to keep the set of traces finite. If a difference in the traces of two spi descriptions (typically a specification and the corresponding implementation of a protocol) is found, it can be used to automatically build the spi calculus description of an intruder process that can exploit the difference.
引用
收藏
页码:222 / 284
页数:63
相关论文
共 25 条
[1]   A calculus for cryptographic protocols: The spi calculus [J].
Abadi, M ;
Gordon, AD .
INFORMATION AND COMPUTATION, 1999, 148 (01) :1-70
[2]  
Abadi M., 1998, Nordic Journal of Computing, V5, P267
[3]  
Amadio R., 2000, LECT NOTES COMPUTER, V1877, P380
[4]  
[Anonymous], 1996, LNCS
[5]  
Boreale M, 2002, SIAM J COMPUT, V31, P947
[6]   A symbolic semantics for the pi-calculus [J].
Boreale, M ;
DeNicola, R .
INFORMATION AND COMPUTATION, 1996, 126 (01) :34-52
[7]  
Boreale M, 2001, LECT NOTES COMPUT SC, V2076, P667
[8]  
BOREALE M, 2002, LECT NOTES COMPUTER, V2421, P483
[9]  
Clarke E. M., 1998, Programming Concepts and Methods. PROCOMET '98. IFIP TC2/WG2.2,2.3 International Conference, P87
[10]   Verifying security protocols with Brutus [J].
Clarke, EM ;
Jha, S ;
Marrero, W .
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2000, 9 (04) :443-487