@inproceedings{e7cfd444993b4393b68c03c8b1018a38,
title = "Timed Model Checking of Security Protocols",
abstract = "We propose a method for engineering security protocols that are aware of timing aspects. We study a simplified version of the well-known Needham Schroeder protocol and the complete Yahalom protocol. Timing information allows the study of different attack scenarios. We illustrate the attacks by model checking the protocol using Uppaal. We also present new challenges and threats that arise when considering time.",
keywords = "EWI-766, IR-48643, METIS-220303, SCS-Cybersecurity",
author = "R.J. Corin and Sandro Etalle and Hartel, {Pieter H.} and Mader, {Angelika H.}",
note = "Imported from DIES; 2nd ACM Workshop on Formal Methods in Security Engineering: From Specifications to Code (FMSE) ; Conference date: 01-10-2004 Through 01-10-2004",
year = "2004",
month = oct,
doi = "10.1145/1029133.1029137",
language = "Undefined",
isbn = "1-58113-971-3",
publisher = "ACM Press",
pages = "23--32",
editor = "V. Atluri and M. Backes and D.A. Basin and M. Waidner",
booktitle = "2nd ACM Workshop on Formal Methods in Security Engineering: From Specifications to Code (FMSE)",
}