A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
Authors
Abstract:
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this approach and then we model and verify some famous security protocols using Scyther. Theorem proving is based on deriving the desired goals from assumption of protocols via a deduction system. We define a deduction system named Simple Logic for Authentication to formally define the notion of authenticated communication based on the structure of the messages, and then we several famous protocols using our proposed deduction system and compare it with the verification results of Scyther model checking.
similar resources
Approaches to Formal Verification of Security Protocols
— In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional correctness before they are used in practice. Application of formal methods for verification of security protocols would enhance their reliability thereby, increasing the usability of systems that employ them. Thus, formal...
full textCombining Model Checking and Theorem Proving in Hardware Verification
In the age of submicron technology a single chip may contain tens or even hundreds of millions transistors. The task of making such enormous systems correct becomes a true challenge for the engineers. Pure simulation can only examine a tiny portion of the functionality of such devices, and can easily miss important errors. Formal verification has a potential of proving correctness of the design...
full textExperiments in Theorem Proving and Model Checking for Protocol Verification
Communication protocols pose interesting and diicult challenges for veriication technologies. The state spaces of interesting protocols are either innnite or too large for nite-state veriication techniques like model checking and state exploration. Theorem proving is also not eeective since the formal correctness proofs of these protocols can be long and complicated. We describe a series of pro...
full textFormal Verification of Complex Out-of-Order Pipelines by Combining Model-Checking and Theorem-Proving
We describe a methodology for the formal verification of complex out-of-order pipelines as they may be used as execution units in out-of-order processors. The pipelines may process multiple instructions simultaneously, may have branches and cycles in the pipeline structure, may have variable latency, and may reorder instructions internally. The methodology combines model-checking for the verifi...
full textProof-Checking, Theorem-Proving, and Program Verification
This article consists of three parts: a tutorial introduction to a computer program that proves theorems by induction; a brief description of recent applications of that theorem-prover; and a discussion of several nontechnical aspects of the problem of building automatic theorem-provers. The theorem-prover described has proved theorems such as the uniqueness of prime factorizations, Fermat’s th...
full textMy Resources
Journal title
volume 8 issue 1
pages 3- 24
publication date 2016-01-17
By following a journal you will be notified via email when a new issue of this journal is published.
Hosted on Doprax cloud platform doprax.com
copyright © 2015-2023