메뉴 건너뛰기




Volumn 2805, Issue , 2003, Pages 875-893

SAT-based model-checking of security protocols using planning graph analysis

Author keywords

Bounded model checking; SAT encodings; SAT solvers; Security protocols

Indexed keywords

DECISION THEORY; ENCODING (SYMBOLS); FORMAL LOGIC; FORMAL METHODS; NETWORK SECURITY;

EID: 35248876774     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-45236-2_47     Document Type: Article
Times cited : (22)

References (26)
  • 1
    • 85006614284 scopus 로고    scopus 로고
    • Verifying security protocols as planning in logic programming
    • October
    • L. Carlucci Aiello and F. Massacci. Verifying security protocols as planning in logic programming. ACM Trans. on Computational Logic, 2(4):542-580, October 2001.
    • (2001) ACM Trans. on Computational Logic , vol.2 , Issue.4 , pp. 542-580
    • Aiello, L.C.1    Massacci, F.2
  • 3
    • 35048872633 scopus 로고    scopus 로고
    • Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning
    • Houston, Texas, November 2002. Also presented at the FCS & Verify Workshops, Copenhagen, Denmark, July
    • A. Armando and L. Compagna. Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning. In 22nd IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Houston, Texas, November 2002. Also presented at the FCS & Verify Workshops, Copenhagen, Denmark, July 2002.
    • (2002) 22nd IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE)
    • Armando, A.1    Compagna, L.2
  • 6
    • 84944319371 scopus 로고    scopus 로고
    • Symbolic model checking without BDDs
    • W. R. Cleaveland, editor, Tools and Algorithms for the Construction and Analysis of Systems. Part of European Conferences on Theory and Practice of Software, ETAPS'99, Amsterdam, Springer-Verlag
    • Armin Biere, Alessandro Cimatti, Edmund Clarke, and Yunshan Zhu. Symbolic model checking without BDDs. In W. R. Cleaveland, editor, Tools and Algorithms for the Construction and Analysis of Systems. Part of European Conferences on Theory and Practice of Software, ETAPS'99, Amsterdam, volume 1579 of LNCS, pages 193-207. Springer-Verlag, 1999.
    • (1999) LNCS , vol.1579 , pp. 193-207
    • Biere, A.1    Cimatti, A.2    Clarke, E.3    Zhu, Y.4
  • 9
    • 84944686372 scopus 로고    scopus 로고
    • A Tool for Lazy Verification of Security Protocols
    • IEEE Computer Society Press, Long version available as Technical Report A01-R-140, LORIA, Nancy (France)
    • Y. Chevalier and L. Vigneron. A Tool for Lazy Verification of Security Protocols. In Proceedings of the Automated Software Engineering Conference (ASE'01). IEEE Computer Society Press, 2001. Long version available as Technical Report A01-R-140, LORIA, Nancy (France).
    • (2001) Proceedings of the Automated Software Engineering Conference (ASE'01)
    • Chevalier, Y.1    Vigneron, L.2
  • 11
    • 0010311743 scopus 로고    scopus 로고
    • Investigating the effect of relevance and reachability constraints on SAT encodings of planning
    • Minh Binh Do, Biplav Srivastava, and Subbarao Kambhampati. Investigating the effect of relevance and reachability constraints on SAT encodings of planning. In Artificial Intelligence Planning Systems, pages 308-314, 2000.
    • (2000) Artificial Intelligence Planning Systems , pp. 308-314
    • Do, M.B.1    Srivastava, B.2    Kambhampati, S.3
  • 15
    • 84867787499 scopus 로고    scopus 로고
    • Evaluating search heuristics and optimization techniques in propositional satisfiability
    • Proceedings of IJCAR'2001, Springer-Verlag, Heidelberg
    • E. Giunchiglia, M. Maratea, A. Tacchella, and D. Zambonin. Evaluating search heuristics and optimization techniques in propositional satisfiability. In Proceedings of IJCAR'2001, LNAI 2083, pages 347-363. Springer-Verlag, Heidelberg, 2001.
    • (2001) LNAI , vol.2083 , pp. 347-363
    • Giunchiglia, E.1    Maratea, M.2    Tacchella, A.3    Zambonin, D.4
  • 17
    • 84956860311 scopus 로고    scopus 로고
    • Compiling and Verifying Security Protocols
    • M. Parigot and A. Voronkov, editors, Proceedings of LPAR 2000, Springer-Verlag, Heidelberg
    • Florent Jacquemard, Michael Rusinowitch, and Laurent Vigneron. Compiling and Verifying Security Protocols. In M. Parigot and A. Voronkov, editors, Proceedings of LPAR 2000, LNCS 1955, pages 131-160. Springer-Verlag, Heidelberg, 2000.
    • (2000) LNCS , vol.1955 , pp. 131-160
    • Jacquemard, F.1    Rusinowitch, M.2    Vigneron, L.3
  • 20
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Shroeder public-key protocol using FDR
    • Springer-Verlag
    • G. Lowe. Breaking and fixing the Needham-Shroeder public-key protocol using FDR. In Proceedings of TACAS'96, pages 147-166. Springer-Verlag, 1996.
    • (1996) Proceedings of TACAS'96 , pp. 147-166
    • Lowe, G.1
  • 24
    • 0032678887 scopus 로고    scopus 로고
    • Athena: A new efficient automatic checker for security protocol analysis
    • IEEE Computer Society Press
    • D. Song. Athena: A new efficient automatic checker for security protocol analysis. In Proceedings of the 12th IEEE Computer Security Foundations Workshop (CSFW '99), pages 192-202. IEEE Computer Society Press, 1999.
    • (1999) Proceedings of the 12th IEEE Computer Security Foundations Workshop (CSFW '99) , pp. 192-202
    • Song, D.1
  • 25
    • 0032633177 scopus 로고    scopus 로고
    • Recent advances in AI planning
    • Daniel S. Weld. Recent advances in AI planning. AI Magazine, 20(2):93-123, 1999.
    • (1999) AI Magazine , vol.20 , Issue.2 , pp. 93-123
    • Weld, D.S.1
  • 26
    • 84937410369 scopus 로고    scopus 로고
    • SATO: An efficient prepositional prover
    • William McCune, editor, Proceedings of CADE 14, Springer-Verlag, Heidelberg
    • H. Zhang. SATO: An efficient prepositional prover. In William McCune, editor, Proceedings of CADE 14, LNAI 1249, pages 272-275. Springer-Verlag, Heidelberg, 1997.
    • (1997) LNAI , vol.1249 , pp. 272-275
    • Zhang, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.