Security Theorems via Model Theory

نویسنده

  • Joshua D. Guttman
چکیده

A model-theoretic approach can establish security theorems, which are formulas expressing authentication and non-disclosure properties of protocols. Security theorems have a special form, namely quantified implications ∀~x .(φ ⊃ ∃~y .ψ). Models (interpretations) for these formulas are skeletons, partially ordered structures consisting of a number of local protocol behaviors. Realized skeletons contain enough local sessions to explain all the behavior, when combined with some possible adversary behaviors. We show two results. (1) If φ is the antecedent of a security goal, then there is a skeleton Aφ such that, for every skeleton B, φ is satisfied in B iff there is a homomorphism from Aφ to B. (2) A protocol enforces ∀~x .(φ ⊃ ∃~y .ψ) iff every realized homomorphic image of Aφ satisfies ψ . Since the program CPSA finds the minimal realized skeletons, or “shapes,” that are homomorphic images of Aφ , if ψ holds in each of these shapes, then the goal holds.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Preservation theorems in {L}ukasiewicz \model theory

We present some model theoretic results for {L}ukasiewiczpredicate logic by using the methods of continuous model theorydeveloped by Chang and Keisler.We prove compactness theorem with respect to the class of allstructures taking values in the {L}ukasiewicz $texttt{BL}$-algebra.We also prove some appropriate preservation theorems concerning universal and inductive theories.Finally, Skolemizatio...

متن کامل

Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory

Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...

متن کامل

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

Towards SOS Meta-Theory for Language-Based Security (Position Paper)

SOS meta-theory [1] has been very successful in defining general criteria using which one can guarantee useful properties about the language constructs. These meta-theorems can save pages of standard proof thanks to their generic and language-independent formulation. Security properties of language constructs look like promising candidates to be turned into SOS meta-theorems and there has alrea...

متن کامل

Approximation theorems for fuzzy set multifunctions in Vietoris topology. Physical implications of regularity

n this paper, we consider continuity properties(especially, regularity, also viewed as an approximation property) for $%mathcal{P}_{0}(X)$-valued set multifunctions ($X$ being a linear,topological space), in order to obtain Egoroff and Lusin type theorems forset multifunctions in the Vietoris hypertopology. Some mathematicalapplications are established and several physical implications of thema...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009