An Improved Constraint-Based System for the Verification of Security Protocols

Ricardo Corin, Sandro Etalle

    Research output: Book/ReportReportOther research output

    53 Citations (Scopus)
    112 Downloads (Pure)

    Abstract

    We propose a constraint-based system for the verification of security protocols that improves upon the one developed by Millen and Shmatikov [30]. Our system features (1) a significantly more efficient implementation, (2) a monotonic behavior, which also allows to detect flaws associated to partial runs and (3) a more expressive syntax, in which a principal may also perform explicit checks. In this paper we also show why these improvements yield a more effective and practical system.
    Original languageEnglish
    Place of PublicationEnschede
    PublisherCentre for Telematics and Information Technology (CTIT)
    Number of pages16
    Publication statusPublished - Jul 2002

    Publication series

    NameCTIT technical reports series
    PublisherUniversity of Twente, Centre for Telematics and Information Technology (CTIT)
    No.TR-CTIT-02-27
    ISSN (Print)1381-3625

    Keywords

    • SCS-Cybersecurity
    • IR-63070
    • EWI-5865

    Fingerprint

    Dive into the research topics of 'An Improved Constraint-Based System for the Verification of Security Protocols'. Together they form a unique fingerprint.
    • An Improved Constraint-based system for the verification of security protocols

      Corin, R. & Etalle, S., Sept 2002, Static Analysis: 9th International Symposium, SAS 2002 Madrid, Spain, September 17–20, 2002, Proceedings. Hermenegildo, M. V. & Puebla, G. (eds.). Berlin, Heidelberg: Springer, p. 239-265 16 p. (Lecture Notes in Computer Science; vol. 2477).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

      Open Access
      File
      84 Downloads (Pure)

    Cite this