An Improved Constraint-based system for the verification of security protocols

Ricardo Corin, Sandro Etalle

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    80 Downloads (Pure)

    Abstract

    We propose a constraint-based system for the verification of security protocols that improves upon the one developed by Millen and Shmatikov. Our system features (1) a significantly more efficient implementation, (2) a monotonic behavior, which also allows to detect aws associated to partial runs and (3) a more expressive syntax, in which a principal may also perform explicit checks. We also show why these improvements yield a more effective and practical system.
    Original languageEnglish
    Title of host publicationStatic Analysis
    Subtitle of host publication9th International Symposium, SAS 2002 Madrid, Spain, September 17–20, 2002, Proceedings
    EditorsManuel V. Hermenegildo, German Puebla
    Place of PublicationBerlin, Heidelberg
    PublisherSpringer
    Pages239-265
    Number of pages16
    ISBN (Electronic)978-3-540-45789-3
    ISBN (Print)978-3-540-44235-6
    DOIs
    Publication statusPublished - Sept 2002
    Event9th International Symposium on Static Analysis, SAS 2002 - Madrid, Spain
    Duration: 17 Sept 200220 Sept 2002
    Conference number: 9

    Publication series

    NameLecture Notes in Computer Science
    PublisherSpringer
    Volume2477
    ISSN (Print)0302-9743

    Conference

    Conference9th International Symposium on Static Analysis, SAS 2002
    Abbreviated titleSAS
    Country/TerritorySpain
    CityMadrid
    Period17/09/0220/09/02

    Keywords

    • SCS-Cybersecurity
    • Security protocol
    • Mutual authentication
    • Cryptographic protocols
    • Parallel session
    • Strand space

    Fingerprint

    Dive into the research topics of 'An Improved Constraint-based system for the verification of security protocols'. Together they form a unique fingerprint.

    Cite this