메뉴 건너뛰기




Volumn 4428 LNAI, Issue , 2007, Pages 146-165

SAT-based verification of security protocols via translation to networks of automata

Author keywords

Authentication; Model checking; Security protocols

Indexed keywords

AUTHENTICATION; AUTOMATA THEORY; MODEL CHECKING; SECURITY OF DATA;

EID: 34548632468     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74128-2_10     Document Type: Conference Paper
Times cited : (7)

References (30)
  • 1
    • 26444497860 scopus 로고    scopus 로고
    • Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, J., Drielsma, P.H., Heám, P.C., Kouchnarenko, O., Mantovani, J., Mödersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganó, L., Vigneron, L.: The AVISPA tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, 3576, pp. 281-285. Springer, Heidelberg (2005)
    • Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, J., Drielsma, P.H., Heám, P.C., Kouchnarenko, O., Mantovani, J., Mödersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganó, L., Vigneron, L.: The AVISPA tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281-285. Springer, Heidelberg (2005)
  • 3
    • 0003334513 scopus 로고    scopus 로고
    • New generation of Uppaal
    • Proc. of the Int. Workshop on Software Tools for Technology Transfer STTT'98
    • Bengtsson, J., Larsen, K.G., Larsson, F., Pettersson, P., Yi, W., Weise, C.: New generation of Uppaal. In: Proc. of the Int. Workshop on Software Tools for Technology Transfer (STTT'98), BRICS Notes Series, pp. 43-52 (1998)
    • (1998) BRICS Notes Series , pp. 43-52
    • Bengtsson, J.1    Larsen, K.G.2    Larsson, F.3    Pettersson, P.4    Yi, W.5    Weise, C.6
  • 5
    • 24144457604 scopus 로고    scopus 로고
    • A Symbolic Decision Procedure for Cryptographic Protocols with Time Stamps
    • Bozga, L., Ene, C., Lakhnech, Y.: A Symbolic Decision Procedure for Cryptographic Protocols with Time Stamps. Journal of Logic and Algebraic Programming 65(1), 1-35 (2005)
    • (2005) Journal of Logic and Algebraic Programming , vol.65 , Issue.1 , pp. 1-35
    • Bozga, L.1    Ene, C.2    Lakhnech, Y.3
  • 7
    • 0003568551 scopus 로고    scopus 로고
    • A survey of authentication protocol literature
    • Technical Report 1.0
    • Clark, J.A., Jacob, J.L.: A survey of authentication protocol literature. Technical Report 1.0, http://www.cs.york.ac.ukjac/papers/drareview.ps.gz (1997)
    • (1997)
    • Clark, J.A.1    Jacob, J.L.2
  • 11
    • 35248826437 scopus 로고    scopus 로고
    • VerICS: A tool for verifying timed automata and Estelle specifications
    • Garavel, H, Hatcliff, J, eds, ETAPS 2003 and TACAS 2003, Springer, Heidelberg
    • Dembiński, P., Janowska, A., Janowski, P., Penczek, W., Pólrola, A., Szreter, M., Woźna, B., Zbrzezny, A.: VerICS: A tool for verifying timed automata and Estelle specifications. In: Garavel, H., Hatcliff, J. (eds.) ETAPS 2003 and TACAS 2003. LNCS, vol. 2619, pp. 278-283. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2619 , pp. 278-283
    • Dembiński, P.1    Janowska, A.2    Janowski, P.3    Penczek, W.4    Pólrola, A.5    Szreter, M.6    Woźna, B.7    Zbrzezny, A.8
  • 13
    • 84944070422 scopus 로고    scopus 로고
    • Analysing time dependent security properties in csp using pvs
    • Cuppens, F, Deswarte, Y, Gollmann, D, Waidner, M, eds, ESORICS 2000, Springer, Heidelberg
    • Evans, N., Schneider, S.: Analysing time dependent security properties in csp using pvs. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol. 1895, pp. 222-237. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1895 , pp. 222-237
    • Evans, N.1    Schneider, S.2
  • 14
  • 17
    • 0003257683 scopus 로고    scopus 로고
    • Using state space exploration and a natural deduction style message derivation engine to verify security protocols
    • Gries, D, De Roever, W.P, eds, Chapmann and Hall, Sydney
    • Jha, S., Clarke, E.M., Marrero, W.: Using state space exploration and a natural deduction style message derivation engine to verify security protocols. In: Gries, D., De Roever, W.P. (eds.) Proceedings of the IFIP Working Conference on Programming Concepts and Methods (PROCOMET'98), pp. 87-106. Chapmann and Hall, Sydney (1998)
    • (1998) Proceedings of the IFIP Working Conference on Programming Concepts and Methods (PROCOMET'98) , pp. 87-106
    • Jha, S.1    Clarke, E.M.2    Marrero, W.3
  • 19
    • 38149047136 scopus 로고    scopus 로고
    • Verifying Cryptographic Protocols modeled by networks of automata
    • Humboldt University Press, pp
    • Kurkowski, M., Penczek, W. : Verifying Cryptographic Protocols modeled by networks of automata. In: Proc. of CS&P'06, Humboldt University Press, pp. 292-303 (2006)
    • (2006) Proc. of CS&P'06 , pp. 292-303
    • Kurkowski, M.1    Penczek, W.2
  • 20
    • 38149070535 scopus 로고    scopus 로고
    • SAT-based Verification of Security Protocols via Translation to Networks of Automata
    • Report 998 of ICS PAS, Warsaw
    • Kurkowski, M., Penczek, W.: SAT-based Verification of Security Protocols via Translation to Networks of Automata. Report 998 of ICS PAS, Warsaw, http ://www.imi.aj d.czest.pl/pub/report_kp_07.zip (2007)
    • (2007)
    • Kurkowski, M.1    Penczek, W.2
  • 21
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
    • Margaria, T, Steffen, B, eds, TACAS 1996, Springer, Heidelberg
    • Lowe, G.: Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055, pp. 147-166. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 22
  • 23
    • 0031633395 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • Lowe, G.: Casper: A compiler for the analysis of security protocols. Journal of Computer Security 6(1-2), 53-84 (1998)
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 53-84
    • Lowe, G.1
  • 25
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • Meadows, C.: The NRL protocol analyzer: An overview. Journal of Logic Programming 26(2), 13-131 (1996)
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 13-131
    • Meadows, C.1
  • 27
    • 0018048246 scopus 로고
    • Using Encryption for Authentication in large networks of computers
    • Needham, R., Schroeder, M.: Using Encryption for Authentication in large networks of computers. Communications of the ACM 21(12), 993-999 (1978)
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 30
    • 33645312974 scopus 로고    scopus 로고
    • SAT-based reachability checking for timed automata with diagonal constraints
    • Zbrzezny, A.: SAT-based reachability checking for timed automata with diagonal constraints. Fundamenta Informaticae 67(1-3), 303-322 (2005)
    • (2005) Fundamenta Informaticae , vol.67 , Issue.1-3 , pp. 303-322
    • Zbrzezny, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.