메뉴 건너뛰기




Volumn 7, Issue 1, 2008, Pages 3-32

SAT-based model-checking for security protocols analysis

Author keywords

Bounded model checking; Multi set rewriting; SAT based model checking; Security protocols

Indexed keywords

DATA PRIVACY; DATA STRUCTURES; NETWORK PROTOCOLS; NETWORK SECURITY;

EID: 38149132464     PISSN: 16155262     EISSN: 16155270     Source Type: Journal    
DOI: 10.1007/s10207-007-0041-y     Document Type: Conference Paper
Times cited : (87)

References (64)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • Abadi M. (1999). Secrecy by typing in security protocols. J. ACM 46(5): 749-786
    • (1999) J. ACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 2
    • 0005801960 scopus 로고
    • Some doubly exponential sequences
    • Aho A.V. and Sloane N.J.A. (1973). Some doubly exponential sequences. Fibonacci Q. 11: 429-437
    • (1973) Fibonacci Q. , vol.11 , pp. 429-437
    • Aho, A.V.1    Sloane, N.J.A.2
  • 3
    • 85006614284 scopus 로고    scopus 로고
    • Verifying security protocols as planning in logic programming
    • Aiello L.C. and Massacci F. (2001). Verifying security protocols as planning in logic programming. ACM Trans. Comput. Logic 2(4): 542-580
    • (2001) ACM Trans. Comput. Logic , vol.2 , Issue.4 , pp. 542-580
    • Aiello, L.C.1    Massacci, F.2
  • 4
  • 7
    • 84954313527 scopus 로고    scopus 로고
    • Automatic SAT-compilation of protocol insecurity problems via reduction to planning
    • In: Springer
    • Armando, A., Compagna, L.: Automatic SAT-compilation of protocol insecurity problems via reduction to planning. In: Proceedings of FORTE 2002, LNCS, vol. 2529, pp. 210-225. Springer (2002)
    • (2002) Proceedings of FORTE 2002, LNCS , vol.2529 , pp. 210-225
    • Armando, A.1    Compagna, L.2
  • 8
    • 35048841165 scopus 로고    scopus 로고
    • Abstraction-driven SAT-based analysis of security protocols
    • In: Giunchiglia, E., Tacchella, A. (eds.) Springer Selected Revised Papers. Presented to SAT 2003, S. Margherita Ligure, Italy. Available at
    • Armando, A., Compagna, L.: Abstraction-driven SAT-based analysis of security protocols. In: Giunchiglia, E., Tacchella, A. (eds.) Theory and Applications of Satisfiability Testing, LNCS, vol. 2919, pp. 257-271. Springer (2004). Selected Revised Papers. Presented to SAT 2003, S. Margherita Ligure, Italy. Available at http://www.avispa-project.org
    • (2004) Theory and Applications of Satisfiability Testing, LNCS , vol.2919 , pp. 257-271
    • Armando, A.1    Compagna, L.2
  • 10
    • 35248876774 scopus 로고    scopus 로고
    • SAT-based model- checking of security protocols using planning graph analysis
    • In: Springer
    • Armando, A., Compagna, L., Ganty, P.: SAT-based model- checking of security protocols using planning graph analysis. In: Proceedings of FME'2003, LNCS, vol. 2805. Springer (2003)
    • (2003) Proceedings of FME'2003, LNCS , vol.2805
    • Armando, A.1    Compagna, L.2    Ganty, P.3
  • 12
    • 0142188052 scopus 로고    scopus 로고
    • An on-the-fly model-checker for security protocol analysis
    • In: Snekkenes, E., Gollmann, D. (eds.) Springer (2003). Available at
    • Basin, D., Mödersheim, S., Viganò, L.: An on-the-fly model-checker for security protocol analysis. In: Snekkenes, E., Gollmann, D. (eds.) Proceedings of ESORICS'03, LNCS, vol. 2808, pp. 253-270. Springer (2003). Available at http://www.avispa-project.org
    • Proceedings of ESORICS'03, LNCS , vol.2808 , pp. 253-270
    • Basin, D.1    Mödersheim, S.2    Viganò, L.3
  • 13
    • 18744415053 scopus 로고    scopus 로고
    • Constraint differentiation: A new reduction technique for constraint-based analysis of security protocols
    • In: Atluri, V., Liu, P. (eds.) ACM Press (2003). Available at
    • Basin, D., Mödersheim, S., Viganò, L.: Constraint differentiation: A new reduction technique for constraint-based analysis of security protocols. In: Atluri, V., Liu, P. (eds.) Proceedings of CCS'03, pp. 335-344. ACM Press (2003). Available at http:// www.avispa-project.org
    • Proceedings of CCS'03 , pp. 335-344
    • Basin, D.1    Mödersheim, S.2    Viganò, L.3
  • 15
    • 84944319371 scopus 로고    scopus 로고
    • Symbolic model checking without BDDs
    • In: Cleaveland, W.R. (ed.) Springer
    • Biere, A., Cimatti, A., Clarke, E., Zhu, Y.: Symbolic model checking without BDDs. In: Cleaveland, W.R. (ed.) Proceedings of TACAS'99, LNCS, vol. 1579, pp. 193-207. Springer (1999)
    • (1999) Proceedings of TACAS'99, LNCS , vol.1579 , pp. 193-207
    • Biere, A.1    Cimatti, A.2    Clarke, E.3    Zhu, Y.4
  • 16
    • 13644264990 scopus 로고    scopus 로고
    • Verification of cryptographic protocols: Tagging enforces termination
    • (in press)
    • Blanchet, P.: Verification of cryptographic protocols: Tagging enforces termination. Theor. Comput. Sci. 333 (2005) (in press)
    • (2005) Theor. Comput. Sci. , vol.333
    • Blanchet, P.1
  • 17
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on prolog rules
    • In: IEEE Computer Society Press
    • Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: Proceedings of CSFW'01, pp. 82-96. IEEE Computer Society Press (2001)
    • (2001) Proceedings of CSFW'01 , pp. 82-96
    • Blanchet, B.1
  • 18
    • 1242332714 scopus 로고    scopus 로고
    • Automatic verification of cryptographic protocols: A logic programming approach (invited talk)
    • In: ACM Press
    • Blanchet, B.: Automatic verification of cryptAgraphic protocols: a logic programming approach (invited talk). In: Proceedings of PPDP'03, pp. 1-3. ACM Press (2003)
    • (2003) Proceedings of PPDP'03 , pp. 1-3
    • Blanchet, B.1
  • 19
    • 3543058869 scopus 로고    scopus 로고
    • Automatic proof of strong secrecy for security protocols
    • In: IEEE Computer Society Press
    • Blanchet, B.: Automatic proof of strong secrecy for security protocols. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 86-100. IEEE Computer Society Press (2004)
    • (2004) Proceedings of IEEE Symposium on Security and Privacy , pp. 86-100
    • Blanchet, B.1
  • 23
    • 21144444143 scopus 로고    scopus 로고
    • Compositional analysis of authentication protocols
    • In: Schmidt, D.A. (ed.) Springer URL
    • Bugliesi, M., Focardi, R., Maffei, M.: Compositional analysis of authentication protocols. In: Schmidt, D.A. (ed.) ESOP, Lecture Notes in Computer Science, vol. 2986, pp. 140-154. Springer (2004). URL http:// springerlink.metapress.com/openurl.asp?genre=article&issn= 0302-9743&volume=2986&spage=140
    • (2004) ESOP, Lecture Notes in Computer Science , vol.2986 , pp. 140-154
    • Bugliesi, M.1    Focardi, R.2    Maffei, M.3
  • 24
    • 0032671775 scopus 로고    scopus 로고
    • A meta-notation for protocol analysis
    • In: URL
    • Cervesato, I., Durgin, N.A., Lincoln, P., Mitchell, J.C., Scedrov, A.: A meta-notation for protocol analysis. In: CSFW, pp. 55-69 (1999). URL http://citeseer.nj.nec.com/cervesato99metanotation.html
    • (1999) CSFW , pp. 55-69
    • Cervesato, I.1    Durgin, N.A.2    Lincoln, P.3    Mitchell, J.C.4    Scedrov, A.5
  • 26
    • 84937559950 scopus 로고    scopus 로고
    • Automated unbounded verification of security protocols
    • In: Brinksma, E., Larsen, K.G. (eds.) Springer
    • Chevalier, Y., Vigneron, L.: Automated unbounded verification of security protocols. In: Brinksma, E., Larsen, K.G. (eds.) Proceedings of CAV'02, LNCS, vol. 2404, pp. 324-337. Springer (2002)
    • (2002) Proceedings of CAV'02, LNCS , vol.2404 , pp. 324-337
    • Chevalier, Y.1    Vigneron, L.2
  • 28
    • 84863949796 scopus 로고    scopus 로고
    • Partial order reductions for security protocol verification
    • Clarke, E.M., Jha, S., Marrero, W.R.: Partial order reductions for security protocol verification. In: TACAS, pp. 503-518 (2000)
    • (2000) TACAS , pp. 503-518
    • Clarke, E.M.1    Jha, S.2    Marrero, W.R.3
  • 29
    • 38149033346 scopus 로고    scopus 로고
    • SAT-based model-checking of security protocols
    • Ph.D. thesis, Università degli Studi di Genova and the University of Edinburgh (joint programme)
    • Compagna, L.: SAT-based model-checking of security protocols. Ph.D. thesis, Università degli Studi di Genova and the University of Edinburgh (joint programme) (2005)
    • (2005)
    • Compagna, L.1
  • 30
    • 84958742278 scopus 로고    scopus 로고
    • An improved constraint-based system for the verification of security protocols
    • In: Springer
    • Corin, R., Etalle, S.: An improved constraint-based system for the verification of security protocols. In: Proceedings of SAS 2002, LNCS, vol. 2477, pp. 326-341. Springer (2002)
    • (2002) Proceedings of SAS 2002, LNCS , vol.2477 , pp. 326-341
    • Corin, R.1    Etalle, S.2
  • 31
    • 0020720357 scopus 로고
    • On the security of public-key protocols
    • (in press)
    • Dolev, D., Yao, A.: On the security of public-key protocols. IEEE Trans. Inf. Theory 2 (29) (1983) (in press)
    • (1983) IEEE Trans. Inf. Theory , vol.2 , Issue.29
    • Dolev, D.1    Yao, A.2
  • 33
    • 38149053414 scopus 로고    scopus 로고
    • CVS at work: A report on new failures upon some cryptographic protocols
    • In: Models and Architectures for Network Security, LNCS
    • Durante F., Gorrieri: CVS at work: a report on new failures upon some cryptographic protocols. In: MMMACNS: International Workshop on Methods, Models and Architectures for Network Security, LNCS (2001)
    • (2001) MMMACNS: International Workshop on Methods
    • Durante, F.1    Gorrieri2
  • 38
    • 1442267745 scopus 로고    scopus 로고
    • Secrecy in security protocols as non interference
    • URL
    • Focardi, R., Gorrieri, R., Martinelli, F.: Secrecy in security protocols as non interference. Electr. Notes Theor. Comput. Sci 32 (2000). URL http://www.elsevier.com/gej-ng/31/29/23/57/23/show/Products/notes/ index.htt#007
    • (2000) Electr. Notes Theor. Comput. Sci , vol.32
    • Focardi, R.1    Gorrieri, R.2    Martinelli, F.3
  • 40
    • 0038414953 scopus 로고    scopus 로고
    • Typing correspondence assertions for communication protocols
    • (in press)
    • Gordon, J.: Typing correspondence assertions for communication protocols. Theor. Comput. Sci. 300 (2003) (in press)
    • (2003) Theor. Comput. Sci. , vol.300
    • Gordon, J.1
  • 41
    • 0141863341 scopus 로고    scopus 로고
    • Authenticity by typing for security protocols
    • Gordon A.D. and Jeffrey A. (2003). Authenticity by typing for security protocols. J. Comput. Security 11(4): 451-520
    • (2003) J. Comput. Security , vol.11 , Issue.4 , pp. 451-520
    • Gordon, A.D.1    Jeffrey, A.2
  • 42
    • 23144437178 scopus 로고    scopus 로고
    • Using static analysis to validate the SAML single sign-on protocol
    • In: URL
    • Hansen, S.M., Skriver, J., Nielson, H.R.: Using static analysis to validate the SAML single sign-on protocol. In: WITS (2005). URL http:// www2.imm.dtu.dk/pubdb/p.php?3657
    • (2005) WITS
    • Hansen, S.M.1    Skriver, J.2    Nielson, H.R.3
  • 44
    • 38149107981 scopus 로고    scopus 로고
    • Information technology - Security Techniques - Entity Authentication - Part 3: Mechanisms Using Digital Signature Techniques
    • ISO/IEC: ISO/IEC 9798-3:
    • ISO/IEC: ISO/IEC 9798-3: Information technology - Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques (1997)
    • (1997)
  • 46
    • 0002303187 scopus 로고
    • Planning as satisfiability
    • Kautz, H.A., Selman, B.: Planning as satisfiability. In: ECAI, pp. 359-363 (1992)
    • (1992) ECAI , pp. 359-363
    • Kautz, H.A.1    Selman, B.2
  • 47
    • 0344243483 scopus 로고    scopus 로고
    • Answer set programming and plan generation
    • doi
    • Lifschitz, V.: Answer set programming and plan generation. Artif. Intell. 138 (1-2), 39-54 (2002). doi: http://dx.doi.org/10.1016/ S0004-3702(02)00186-8
    • (2002) Artif. Intell. , vol.138 , Issue.1-2 , pp. 39-54
    • Lifschitz, V.1
  • 48
    • 2942667864 scopus 로고    scopus 로고
    • ASSAT: Computing answer sets of a logic program by SAT solvers
    • Lin F. and Zhao Y. (2004). ASSAT: Computing answer sets of a logic program by SAT solvers. Artif. Intell. 157(1-2): 115-137
    • (2004) Artif. Intell. , vol.157 , Issue.1-2 , pp. 115-137
    • Lin, F.1    Zhao, Y.2
  • 49
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Shroeder Public-Key protocol using FDR
    • In: Margaria, T., Steffen, B. (eds.) Springer
    • Lowe, G.: Breaking and fixing the Needham-Shroeder Public-Key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) Proceedings of TACAS'96, LNCS, vol. 1055, pp. 147-166. Springer (1996)
    • (1996) Proceedings of TACAS'96, LNCS , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 51
    • 0031634547 scopus 로고    scopus 로고
    • Towards a completeness result for model checking of security protocols
    • In: IEEE Computer Society Press URL
    • Lowe, G.: Towards a completeness result for model checking of security protocols. In: Proceedings of CSFW'98. IEEE Computer Society Press (1998). URL http://citeseer.nj.nec.com/article/lowe98towards.html
    • (1998) Proceedings of CSFW'98
    • Lowe, G.1
  • 53
    • 0037209815 scopus 로고    scopus 로고
    • Analysis of security protocols as open systems
    • Martinelli F. (2003). Analysis of security protocols as open systems. Theor. Comput Sci. 290(1): 1057-1106
    • (2003) Theor. Comput Sci. , vol.290 , Issue.1 , pp. 1057-1106
    • Martinelli, F.1
  • 57
    • 14044269417 scopus 로고
    • Using encryption for authentication in large networks of computers
    • CSL-78-4, Xerox Palo Alto Research Center, Palo Alto Reprinted June 1982
    • Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Tech. Rep. CSL-78-4, Xerox Palo Alto Research Center, Palo Alto (1978). Reprinted June 1982
    • (1978) Tech. Rep.
    • Needham, R.M.1    Schroeder, M.D.2
  • 58
    • 0033260715 scopus 로고    scopus 로고
    • Logic programs with stable model semantics as a constraint programming paradigm
    • Niemelä I. (1999). Logic programs with stable model semantics as a constraint programming paradigm. Ann. Math. Artif. Intell. 25(3-4): 241-273
    • (1999) Ann. Math. Artif. Intell , vol.25 , Issue.3-4 , pp. 241-273
    • Niemelä, I.1
  • 59
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Paulson L.C. (1998). The inductive approach to verifying cryptographic protocols. J. Comput. Security 6(1): 85-128
    • (1998) J. Comput. Security , vol.6 , Issue.1 , pp. 85-128
    • Paulson, L.C.1
  • 60
    • 38149116728 scopus 로고    scopus 로고
    • Submitted for journal publication. Eearlier version: Technical report 216, Albert-Ludwigs-Universität Freiburg, Institut fnr Informatik, 2005. Available at URL
    • Rintanen, J., Heljanko, K., Niemelä, I.: Planning as satisfiability: Parallel plans and algorithms for plan search (2005). Submitted for journal publication. Eearlier version: Technical report 216, Albert-Ludwigs-Universität Freiburg, Institut fnr Informatik, 2005. Available at URL http://www.informatik.uni-freiburg.de/~rintanen
    • (2005) Planning As Satisfiability: Parallel Plans and Algorithms for Plan Search
    • Rintanen, J.1    Heljanko, K.2    Niemelä, I.3
  • 62
    • 0035072287 scopus 로고    scopus 로고
    • Athena: A novel approach to efficient automatic security protocol analysis
    • Song D., Berezin S. and Perrig A. (2001). Athena: A novel approach to efficient automatic security protocol analysis. J. Comput. Security 9: 47-74
    • (2001) J. Comput. Security , vol.9 , pp. 47-74
    • Song, D.1    Berezin, S.2    Perrig, A.3
  • 64
    • 13944268535 scopus 로고    scopus 로고
    • Sécurité des Protocoles Cryptographiques: Décidabilité et Complexité
    • Ph.D. thesis, Université Henri Poincaré, Nancy
    • Turuani, M.: Sécurité des Protocoles Cryptographiques: Décidabilité et Complexité. Ph.D. thesis, Université Henri Poincaré, Nancy (2003)
    • (2003)
    • Turuani, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.