Multiple Independent Lazy Intruders

نویسندگان

  • Ali Kassem
  • Pascal Lafourcade
  • Yassine Lakhnech
  • Sebastian Mödersheim
چکیده

We consider a model of multiple independent intruders that have no ability to share knowledge between each other. We use this model to analyze security in wireless ad-hoc networks, where each intruder has a local control in the network, i.e., he can read and send messages only to his direct neighbors. Another application is the mobile ambient calculus where several intruder processes are not able to exchange their knowledge. Both these security problems can be reduced to satisfiability of lazy intruder constraint systems, for a bounded number of steps of the honest agents. However, the constraint-based verification method usually relies on a well-formedness property of constraints. This well-formedness entails that the constraints can be ordered so that the intruder knowledge is monotonically growing. This does not hold for several intruders that learn independent of each other. For the resulting generalized class of weak-well-formed constraints, we give a novel constraint reduction procedure and prove that it is sound, complete and terminating. We also prove that it is NP-complete. KeywordsMultiple independent intruders, constraint-based deduction, routing protocols, mobile code.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Decision Procedure for Solving Constraint Systems in Presence of Multiple Independent Intruders

We consider a model of multiple independent intruders that have no ability to share knowledge between each other. We use this model to analyze security in wireless ad-hoc networks, where each intruder has a local control in the network, i.e., he can read and send messages only to his direct neighbors. Another application is the mobile ambient calculus where several intruder processes are not ab...

متن کامل

Lazy Mobile Intruders (Extended Version)

We present a new technique for analyzing platforms that execute potentially malicious code, such as web-browsers, mobile phones, or virtualized infrastructures. Rather than analyzing given code, we ask what code an intruder could create to break a security goal of the platform. To avoid searching the infinite space of programs that the intruder could come up with (given some initial knowledge) ...

متن کامل

Lazy Incremental Learning of Control Knowledge for E ciently Obtaining Quality Plans

General-purpose generative planners use domain-independent search heuristics to generate solutions for problems in a variety of domains. However, in some situations these heuristics force the planner to perform ineeciently or obtain solutions of poor quality. Learning from experience can help to identify the particular situations for which the domain-independent heuristics need to be overridden...

متن کامل

Lazy Incremental Learning of Control Knowledge for Eeciently Obtaining Quality Plans

General-purpose generative planners use domain-independent search heuristics to generate solutions for problems in a variety of domains. However, in some situations these heuristics force the planner to perform ineeciently or obtain solutions of poor quality. Learning from experience can help to identify the particular situations for which the domain-independent heuristics need to be overridden...

متن کامل

The Lazy Matroid Problem

This article introduces the lazy matroid problem, which captures the goal of saving time or money in certain task selection scenarios. We are given a budget B and a matroid M with weights on its elements. The problem consists in finding an independent set F of minimum weight. In addition, F is feasible if its augmentation with any new element x implies that either F + x exceeds B or F + x is de...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013