An Improved Constraint-Based System for the Verification of Security Protocols

R.J. Corin, Sandro Etalle

    Research output: Book/ReportReportOther research output

    43 Citations (Scopus)

    Abstract

    We propose a constraint-based system for the verification of security protocols that improves upon the one developed by Millen and Shmatikov [30]. Our system features (1) a significantly more efficient implementation, (2) a monotonic behavior, which also allows to detect flaws associated to partial runs and (3) a more expressive syntax, in which a principal may also perform explicit checks. In this paper we also show why these improvements yield a more effective and practical system.
    Original languageUndefined
    Place of PublicationEnschede
    PublisherCentre for Telematics and Information Technology (CTIT)
    Publication statusPublished - Jul 2002

    Publication series

    NameCTIT technical reports series
    PublisherUniversity of Twente, Centre for Telematics and Information Technology (CTIT)
    No.TR-CTIT-02-27
    ISSN (Print)1381-3625

    Keywords

    • SCS-Cybersecurity
    • IR-63070
    • EWI-5865

    Cite this

    Corin, R. J., & Etalle, S. (2002). An Improved Constraint-Based System for the Verification of Security Protocols. (CTIT technical reports series; No. TR-CTIT-02-27). Enschede: Centre for Telematics and Information Technology (CTIT).
    Corin, R.J. ; Etalle, Sandro. / An Improved Constraint-Based System for the Verification of Security Protocols. Enschede : Centre for Telematics and Information Technology (CTIT), 2002. (CTIT technical reports series; TR-CTIT-02-27).
    @book{3bc7f8670b454e2db2c293d0bd5d1232,
    title = "An Improved Constraint-Based System for the Verification of Security Protocols",
    abstract = "We propose a constraint-based system for the verification of security protocols that improves upon the one developed by Millen and Shmatikov [30]. Our system features (1) a significantly more efficient implementation, (2) a monotonic behavior, which also allows to detect flaws associated to partial runs and (3) a more expressive syntax, in which a principal may also perform explicit checks. In this paper we also show why these improvements yield a more effective and practical system.",
    keywords = "SCS-Cybersecurity, IR-63070, EWI-5865",
    author = "R.J. Corin and Sandro Etalle",
    note = "Imported from CTIT",
    year = "2002",
    month = "7",
    language = "Undefined",
    series = "CTIT technical reports series",
    publisher = "Centre for Telematics and Information Technology (CTIT)",
    number = "TR-CTIT-02-27",
    address = "Netherlands",

    }

    Corin, RJ & Etalle, S 2002, An Improved Constraint-Based System for the Verification of Security Protocols. CTIT technical reports series, no. TR-CTIT-02-27, Centre for Telematics and Information Technology (CTIT), Enschede.

    An Improved Constraint-Based System for the Verification of Security Protocols. / Corin, R.J.; Etalle, Sandro.

    Enschede : Centre for Telematics and Information Technology (CTIT), 2002. (CTIT technical reports series; No. TR-CTIT-02-27).

    Research output: Book/ReportReportOther research output

    TY - BOOK

    T1 - An Improved Constraint-Based System for the Verification of Security Protocols

    AU - Corin, R.J.

    AU - Etalle, Sandro

    N1 - Imported from CTIT

    PY - 2002/7

    Y1 - 2002/7

    N2 - We propose a constraint-based system for the verification of security protocols that improves upon the one developed by Millen and Shmatikov [30]. Our system features (1) a significantly more efficient implementation, (2) a monotonic behavior, which also allows to detect flaws associated to partial runs and (3) a more expressive syntax, in which a principal may also perform explicit checks. In this paper we also show why these improvements yield a more effective and practical system.

    AB - We propose a constraint-based system for the verification of security protocols that improves upon the one developed by Millen and Shmatikov [30]. Our system features (1) a significantly more efficient implementation, (2) a monotonic behavior, which also allows to detect flaws associated to partial runs and (3) a more expressive syntax, in which a principal may also perform explicit checks. In this paper we also show why these improvements yield a more effective and practical system.

    KW - SCS-Cybersecurity

    KW - IR-63070

    KW - EWI-5865

    M3 - Report

    T3 - CTIT technical reports series

    BT - An Improved Constraint-Based System for the Verification of Security Protocols

    PB - Centre for Telematics and Information Technology (CTIT)

    CY - Enschede

    ER -

    Corin RJ, Etalle S. An Improved Constraint-Based System for the Verification of Security Protocols. Enschede: Centre for Telematics and Information Technology (CTIT), 2002. (CTIT technical reports series; TR-CTIT-02-27).