Automatic compilation of protocol insecurity problems into logic programming

被引:4
作者
Armando, A [1 ]
Compagna, L
Lierler, Y
机构
[1] Univ Genoa, AI Lab, DIST, Genoa, Italy
[2] Univ Erlangen Nurnberg, AI, Erlangen, Germany
来源
LOGICS IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS | 2004年 / 3229卷
关键词
D O I
10.1007/978-3-540-30227-8_51
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper we show how protocol insecurity problems expressed in a multi-set rewriting formalism can be automatically translated into logic programming problems. The proposed translation paves the way to the construction of model-checkers for security protocols based on state-of-the-art solvers for logic programs. We have assessed the effectiveness of the approach by running the proposed reduction against a selection of insecurity problems drawn from the Clark & Jacob library of security protocols: by running state-of-the-art solvers against the resulting logic programming problems most of the (known) attacks on the considered protocols are found in a few seconds.
引用
收藏
页码:617 / 627
页数:11
相关论文
共 21 条
[1]  
Aiello L.C., 2001, ACM T COMPUTATIONAL, V2, P542
[2]  
[Anonymous], LNCS
[3]  
[Anonymous], 1997, A survey of authentication protocol literature: Version 1.0
[4]  
ARMANDO A, 2002, LNCS, V2529
[5]  
ARMANDO A, 2003, LNCS, V2805
[6]  
ARMANDO A, 2004, IN PRESS P ARSPA 200
[7]  
Armando A., 2003, LNCS, V2919
[8]  
Basin D., 2003, LNCS, V2808
[9]  
Denker G., 2000, P DARPA INF SURV C E, P251
[10]  
DOLEV D, 1983, IEEE T INFORMATION T, V2