Proving Hybrid Protocols Correct
نویسندگان
چکیده
R. Boulton & P. Jackson, eds., 14 International Conference on Theorem Proving in Higher Order Logics (TPHOLs 2001), LNAI 2152, pp. 105–120, c ©Springer Verlag, 2001. Abstract. We describe a generic switching protocol for the construction of hybrid protocols and prove it correct with the Nuprl proof development system. For this purpose we introduce the concept of metaproperties and use them to formally characterize communication properties that can be preserved by switching. We also identify switching invariants that an implementation of the switching protocol must satisfy in order to work correctly.
منابع مشابه
A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملA Hybrid Method for the Verification and Synthesis of Parameterized Weakly Stabilizing Protocols
We present a hybrid method for verification and synthesis of parameterized self-stabilizing protocols where algorithmic design and mechanical verification techniques/tools are used hand-in-hand. The core idea behind the proposed method includes the automated synthesis of self-stabilizing protocols in a limited scope (i.e., fixed number of processes) and the use of theorem proving methods for th...
متن کاملA Hybrid Analysis for Security Protocols with State
Cryptographic protocols rely on message-passing to coordinate activity among principals. Many richly developed tools, based on wellunderstood foundations, are available for the design and analysis of pure message-passing protocols. However, in many protocols, a principal uses non-local, mutable state to coordinate its local sessions. Cross-session state poses difficulties for protocol analysis ...
متن کاملA Mechanized Logic for Secure Key Escrow Protocol Verification
Reasoning about key escrow protocols has increasingly become an important issue. The Escrowed Encryption Standard (EES) has been proposed as a US government standard for the encryption of un-classiied telecommunications. One unique feature of this system is key escrow. The purpose of key escrow is to allow government access to session keys shared by EES devices. We develop a framework to formal...
متن کاملThe KeYmaera X Proof IDE - Concepts on Usability in Hybrid Systems Theorem Proving
Hybrid systems verification is quite important for developing correct controllers for physical systems, but is also challenging. Verification engineers, thus, need to be empowered with ways of guiding hybrid systems verification while receiving as much help from automation as possible. Due to undecidability, verification tools need sufficient means for intervening during the verification and ne...
متن کامل