Model checking of security protocols with pre-configuration

被引:0
|
作者
Kim, K [1 ]
Abraham, JA [1 ]
Bhadra, J [1 ]
机构
[1] Univ Texas, Comp Engn Res Ctr, Austin, TX 78712 USA
来源
INFORMATION SECURITY APPLICATIONS | 2003年 / 2908卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security protocols are very vulnerable to design errors. Thus many techniques have been proposed for validating the correctness of security protocols. Among these, general model checking is one of the preferred methods. Using tools such as Mur phi, model checking can be performed automatically. Thus protocol designers can use it even if they are not proficient in formal techniques. Although this is an attractive approach, state space explosion prohibits model checkers from validating secure protocols with a significant number of communicating participants. In this paper, we propose "model checking with pre-configuration" which is a "divide-and-conquer" approach that reduces the amount of memory needed for verification. The verification time is also reduced since the method permits the use of symmetry more effectively in model checking. The performance of the method is shown by checking the Needham-Schroeder-Lowe Public-Key protocol using Mur phi.
引用
收藏
页码:1 / 15
页数:15
相关论文
共 50 条
  • [1] LTL model checking for security Protocols
    Armando, Alessandro
    Carbone, Roberto
    Compagna, Luca
    20TH IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSFS20), PROCEEDINGS, 2007, : 385 - +
  • [2] The New Concept of Pre-Configuration and Brain Pathology. A Response to Conrad's Work: 'On the Concept of Pre-Configuration'
    Weinschenk, Curt
    NERVENARZT, 1950, 21 (10): : 452 - 453
  • [3] Model Checking Indistinguishability of Randomized Security Protocols
    Bauer, Matthew S.
    Chadha, Rohit
    Sistla, A. Prasad
    Viswanathan, Mahesh
    COMPUTER AIDED VERIFICATION, CAV 2018, PT II, 2018, 10982 : 117 - 135
  • [4] LDYIS: a Framework for Model Checking Security Protocols
    Lomuscio, Alessio
    Penczek, Wojciech
    FUNDAMENTA INFORMATICAE, 2008, 85 (1-4) : 359 - 375
  • [5] Parallel Bounded Model Checking of Security Protocols
    Kurkowski, Miroslaw
    Siedlecka-Lamch, Olga
    Szymoniak, Sabina
    Piech, Henryk
    PARALLEL PROCESSING AND APPLIED MATHEMATICS (PPAM 2013), PT I, 2014, 8384 : 224 - 234
  • [6] LTL model-checking for security protocols
    Carbone, Roberto
    AI COMMUNICATIONS, 2011, 24 (03) : 281 - 283
  • [7] Top-down task pre-configuration
    Ruz, Maria
    Nobre, Anna C.
    INTERNATIONAL JOURNAL OF PSYCHOLOGY, 2008, 43 (3-4) : 353 - 353
  • [8] Effect of pre-configuration on performance of magnetorheological elastomers
    Fang, S
    Gong, XL
    Zhang, XZ
    Zhang, PQ
    ELECTRORHEOLOGICAL FLUIDS AND MAGNETORHEOLOGICAL SUSPENSIONS (ERMR 2004), PROCEEDINGS, 2005, : 134 - 139
  • [9] An intruder model with message inspection for model checking security protocols
    Basagiannis, Stylianos
    Katsaros, Panagiotis
    Pombortsis, Andrew
    COMPUTERS & SECURITY, 2010, 29 (01) : 16 - 34
  • [10] Model checking security protocols using a logic of belief
    Benerecetti, M
    Giunchiglia, F
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, 2000, 1785 : 519 - 534