A Logic for Constraint-based Security Protocol Analysis

R.J. Corin, A. Saptawijaya, Sandro Etalle

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    31 Citations (Scopus)
    89 Downloads (Pure)

    Abstract

    We propose PS-LTL, a pure-past security linear temporal logic that allows the specification of a variety of authentication, secrecy and data freshness properties. Furthermore, we present a sound and complete decision procedure to establish the validity of security properties for symbolic execution traces, and show the integration with constraint-based analysis techniques.
    Original languageUndefined
    Title of host publicationIEEE Symposium on Security and Privacy
    Place of PublicationLos Alamitos, California
    PublisherIEEE Computer Society
    Pages155-168
    Number of pages15
    ISBN (Print)0-7695-2574-1
    DOIs
    Publication statusPublished - Jan 2006
    Event27th IEEE Symposium on Security and Privacy 2006 - The Claremont Resort , Oakland, United States
    Duration: 21 May 200625 May 2006
    Conference number: 27
    http://www.ieee-security.org/TC/SP2006/oakland06.html

    Publication series

    Name
    PublisherIEEE Computer Society

    Conference

    Conference27th IEEE Symposium on Security and Privacy 2006
    CountryUnited States
    CityOakland
    Period21/05/0625/05/06
    Internet address

    Keywords

    • SCS-Cybersecurity
    • IR-65549
    • METIS-237429
    • EWI-1791

    Cite this