Automated verification of selected equivalences for security protocols
نویسندگان
چکیده
منابع مشابه
Automated Unbounded Verification of Security Protocols
HAL is a multidisciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L'archive ouverte pluridisciplinaire HAL, est destinée au dépôt età la diffusion de documents scientifiques de niveau r...
متن کاملAn Empirical Analysis of Automated Verification of Wireless Security Protocols
Formal verification of security protocols is an important step in the design of security protocols. It helps to reduce the potential of designing faulty protocols and thus increases the confidence in their use. Automated techniques reduce the potential for human errors during verification. This paper presents an empirical study of an automated proving system on the analysis of two wireless comm...
متن کاملChallenges in the Automated Verification of Security Protocols
The application area of security protocols raises several problems that are relevant to automated deduction. We describe in this note some of these challenges.
متن کاملAutomated Verification of Timed Security Protocols with Clock Drift
Time is frequently used in security protocols to provide better security. For instance, critical credentials often have limited lifetime which improves the security against brute-force attacks. However, it is challenging to correctly use time in protocol design, due to the existence of clock drift in practice. In this work, we develop a systematic method to formally specify as well as automatic...
متن کاملEquivalEncEs and calculi for formal vErification of cryptographic protocols
Security protocols are essential to the proper functioning of any distributed system running over an insecure network but often have flaws that can be exploited even without breaking the cryptography. Formal cryptography, the assumption that the cryptographic primitives are flawless, facilitates the construction of formal models and verification tools. Such models are often based on process cal...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of Logic and Algebraic Programming
سال: 2008
ISSN: 1567-8326
DOI: 10.1016/j.jlap.2007.06.002