메뉴 건너뛰기




Volumn 5195 LNAI, Issue , 2008, Pages 396-409

Challenges in the automated verification of security protocols

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATION;

EID: 53049101587     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-71070-7_34     Document Type: Conference Paper
Times cited : (5)

References (50)
  • 1
    • 33750447990 scopus 로고    scopus 로고
    • Deciding knowledge in security protocols under equational theories
    • Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. Theoretical Computer Science 367(1-2), 2-32 (2006)
    • (2006) Theoretical Computer Science , vol.367 , Issue.1-2 , pp. 2-32
    • Abadi, M.1    Cortier, V.2
  • 3
    • 84879078812 scopus 로고    scopus 로고
    • Abadi, M., Rogaway, P.: Reconciling two views of cryptography: the computational soundness of formal encryption. In: Watanabe, O., Hagiya, M., Ito, T., van Leeuwen, J., Mosses, P.D. (eds.) TCS 2000. LNCS, 1872. Springer, Heidelberg (2000)
    • Abadi, M., Rogaway, P.: Reconciling two views of cryptography: the computational soundness of formal encryption. In: Watanabe, O., Hagiya, M., Ito, T., van Leeuwen, J., Mosses, P.D. (eds.) TCS 2000. LNCS, vol. 1872. Springer, Heidelberg (2000)
  • 5
    • 38049162024 scopus 로고    scopus 로고
    • Anantharaman, S., Narendran, P., Rusinowitch, M.: Intruders with caps. In: Baader, F. (ed.) RTA 2007. LNCS, 4533. Springer, Heidelberg (2007)
    • Anantharaman, S., Narendran, P., Rusinowitch, M.: Intruders with caps. In: Baader, F. (ed.) RTA 2007. LNCS, vol. 4533. Springer, Heidelberg (2007)
  • 6
    • 53049083987 scopus 로고    scopus 로고
    • Arapinis, M., Delaune, S., Kremer, S.: From one session to many: Dynamic tags for security protocols. Research Report LSV-08-16, Laboratoire Spécification et Vérification, ENS Cachan, France (May 2008)
    • Arapinis, M., Delaune, S., Kremer, S.: From one session to many: Dynamic tags for security protocols. Research Report LSV-08-16, Laboratoire Spécification et Vérification, ENS Cachan, France (May 2008)
  • 7
    • 38049084697 scopus 로고    scopus 로고
    • Arnaud, M., Cortier, V., Delaune, S.: Combining algorithms for deciding knowledge in security protocols. In: Konev, B., Wolter, F. (eds.) FroCos 2007. LNCS (LNAI), 4720. Springer, Heidelberg (2007)
    • Arnaud, M., Cortier, V., Delaune, S.: Combining algorithms for deciding knowledge in security protocols. In: Konev, B., Wolter, F. (eds.) FroCos 2007. LNCS (LNAI), vol. 4720. Springer, Heidelberg (2007)
  • 9
    • 18744415053 scopus 로고    scopus 로고
    • Basin, D., Mödersheim, S., Viganò, L.: Constraint Differentiation: A New Reduction Technique for Constraint-Based Analysis of Security Protocols. In: Proceedings of CCS 2003, pp. 335-344. ACM Press, New York (2003)
    • Basin, D., Mödersheim, S., Viganò, L.: Constraint Differentiation: A New Reduction Technique for Constraint-Based Analysis of Security Protocols. In: Proceedings of CCS 2003, pp. 335-344. ACM Press, New York (2003)
  • 10
    • 33646262130 scopus 로고    scopus 로고
    • Basin, D., Mödersheim, S., Viganò, L.: Algebraic intruder deductions. In: Sutcliffe, G., Voronkov, A. (eds.) LPAR 2005. LNCS (LNAI), 3835. Springer, Heidelberg (2005)
    • Basin, D., Mödersheim, S., Viganò, L.: Algebraic intruder deductions. In: Sutcliffe, G., Voronkov, A. (eds.) LPAR 2005. LNCS (LNAI), vol. 3835. Springer, Heidelberg (2005)
  • 11
    • 33745778843 scopus 로고    scopus 로고
    • Deciding security of protocols against off-line guessing attacks
    • Alexandria, Virginia, USA, November, ACM Press, New York () 2005
    • Baudet, M.: Deciding security of protocols against off-line guessing attacks. In: Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS 2005), Alexandria, Virginia, USA, November 2005, pp. 16-25. ACM Press, New York (2005)
    • (2005) Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS , pp. 16-25
    • Baudet, M.1
  • 12
    • 38049062912 scopus 로고    scopus 로고
    • Sécurité des protocoles cryptographiques : Aspects logiques et calculators
    • Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France January
    • Baudet, M.: Sécurité des protocoles cryptographiques : aspects logiques et calculators. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France (January 2007)
    • (2007)
    • Baudet, M.1
  • 14
    • 49949093562 scopus 로고    scopus 로고
    • Normal proofs in intruder theories
    • Revised Selected Papers of the 11th Asian Computing Science Conference ASIAN, Springer, Heidelberg
    • Bernat, V., Comon-Lundh, H.: Normal proofs in intruder theories. In: Revised Selected Papers of the 11th Asian Computing Science Conference (ASIAN 2006). LNCS, vol. 4435. Springer, Heidelberg (2008)
    • (2006) LNCS , vol.4435
    • Bernat, V.1    Comon-Lundh, H.2
  • 15
    • 0034822279 scopus 로고    scopus 로고
    • An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
    • Nova Scotia, Canada, June, IEEE Computer Society, Los Alamitos
    • Blanchet, B.: An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In: 14th IEEE Computer Security Foundations Workshop (CSFW-14), Cape Breton, Nova Scotia, Canada, June 2001, pp. 82-96. IEEE Computer Society, Los Alamitos (2001)
    • (2001) 14th IEEE Computer Security Foundations Workshop (CSFW-14), Cape Breton , pp. 82-96
    • Blanchet, B.1
  • 16
    • 53049098668 scopus 로고    scopus 로고
    • Blanchet, B.: An automatic security protocol verifier based on resolution theorem proving (invited tutorial). In: Nieuwenhuis, R. (ed.) CADE 2005. LNCS (LNAI), 3632. Springer, Heidelberg (2005)
    • Blanchet, B.: An automatic security protocol verifier based on resolution theorem proving (invited tutorial). In: Nieuwenhuis, R. (ed.) CADE 2005. LNCS (LNAI), vol. 3632. Springer, Heidelberg (2005)
  • 18
    • 13644264990 scopus 로고    scopus 로고
    • Verification of cryptographic protocols: Tagging enforces termination
    • Blanchet, B., Podelski, A.: Verification of cryptographic protocols: Tagging enforces termination. Theoretical Computer Science 333(1-2), 67-90 (2005)
    • (2005) Theoretical Computer Science , vol.333 , Issue.1-2 , pp. 67-90
    • Blanchet, B.1    Podelski, A.2
  • 19
    • 38149133354 scopus 로고    scopus 로고
    • Bursuc, S., Comon-Lundh, H., Delaune, S.: Deducibility constraints, equational theory and electronic money. In: Comon-Lundh, H., Kirchner, C., Kirchner, H. (eds.) Jouannaud Festschrift. LNCS, 4600. Springer, Heidelberg (2007)
    • Bursuc, S., Comon-Lundh, H., Delaune, S.: Deducibility constraints, equational theory and electronic money. In: Comon-Lundh, H., Kirchner, C., Kirchner, H. (eds.) Jouannaud Festschrift. LNCS, vol. 4600. Springer, Heidelberg (2007)
  • 21
    • 35248865266 scopus 로고    scopus 로고
    • Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents
    • Pandya, P.K, Radhakrishnan, J, eds, FSTTCS 2003, Springer, Heidelberg
    • Chevalier, Y., Küsters, R., Rusinowitch, M., Turuani, M.: Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents. In: Pandya, P.K., Radhakrishnan, J. (eds.) FSTTCS 2003. LNCS, vol. 2914. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2914
    • Chevalier, Y.1    Küsters, R.2    Rusinowitch, M.3    Turuani, M.4
  • 22
    • 0041967380 scopus 로고    scopus 로고
    • Chevalier, Y., Küsters, R,., Rusinowitch, M., Turuani, M.: An NP decision procedure for protocol insecurity with XOR. In: Eighteenth Annual IEEE Symposium on Logic in Computer Science (LICS) (2003)
    • Chevalier, Y., Küsters, R,., Rusinowitch, M., Turuani, M.: An NP decision procedure for protocol insecurity with XOR. In: Eighteenth Annual IEEE Symposium on Logic in Computer Science (LICS) (2003)
  • 23
    • 14044254755 scopus 로고    scopus 로고
    • Deciding the security of protocols with commuting public key encryption
    • Proc. Workshop on Automated Reasoning for Security Protocol Analysis ARSPA
    • Chevalier, Y., Küsters, R., Rusinowitch, M., Turuani, M.: Deciding the security of protocols with commuting public key encryption. In: Proc. Workshop on Automated Reasoning for Security Protocol Analysis (ARSPA). Electronic Notes in Theoretical Computer Science, vol. 125 (2004)
    • (2004) Electronic Notes in Theoretical Computer Science , vol.125
    • Chevalier, Y.1    Küsters, R.2    Rusinowitch, M.3    Turuani, M.4
  • 24
    • 26444458330 scopus 로고    scopus 로고
    • Combining Intruder Theories
    • Caires, L, Italiano, G.F, Monteiro, L, Palamidessi, C, Yung, M, eds, ICALP 2005, Springer, Heidelberg
    • Chevalier, Y., Rusinowitch, M.: Combining Intruder Theories. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3580
    • Chevalier, Y.1    Rusinowitch, M.2
  • 25
    • 33749446224 scopus 로고    scopus 로고
    • Chevalier, Y., Rusinowitch, M.: Hierarchical Combination of Intruder Theories. In: Pfenning, F. (ed.) RTA 2006. LNCS, 4098, pp. 108-122. Springer, Heidelberg (2006)
    • Chevalier, Y., Rusinowitch, M.: Hierarchical Combination of Intruder Theories. In: Pfenning, F. (ed.) RTA 2006. LNCS, vol. 4098, pp. 108-122. Springer, Heidelberg (2006)
  • 26
    • 15744388991 scopus 로고    scopus 로고
    • Tree automata with one memory, set constraints and cryptographic protocols
    • Feb
    • H. Comon and V. Cortier. Tree automata with one memory, set constraints and cryptographic protocols. Theoretical Computer Science, 331(1): 143-214, Feb. 2005.
    • (2005) Theoretical Computer Science , vol.331 , Issue.1 , pp. 143-214
    • Comon, H.1    Cortier, V.2
  • 27
    • 84947780217 scopus 로고    scopus 로고
    • Comon-Lundh, H., Cortier, V.: New decidability results for fragments of first-order logic and application to cryptographic protocols. In: Nieuwenhuis, R. (ed.) RTA 2003. LNCS, 2706. Springer, Heidelberg (2003)
    • Comon-Lundh, H., Cortier, V.: New decidability results for fragments of first-order logic and application to cryptographic protocols. In: Nieuwenhuis, R. (ed.) RTA 2003. LNCS, vol. 2706. Springer, Heidelberg (2003)
  • 28
  • 29
    • 24944569389 scopus 로고    scopus 로고
    • Comon-Lundh, H., Delaune, S.: The finite variant property: How to get rid of some algebraic properties. In: Giesl, J. (ed.) RTA 2005. LNCS, 3467. Springer, Heidelberg (2005)
    • Comon-Lundh, H., Delaune, S.: The finite variant property: How to get rid of some algebraic properties. In: Giesl, J. (ed.) RTA 2005. LNCS, vol. 3467. Springer, Heidelberg (2005)
  • 30
    • 35248836596 scopus 로고    scopus 로고
    • Easy intruder deductions
    • Dershowitz, N, ed, Verification: Theory and Practice, Springer, Heidelberg
    • Comon-Lundh, H., Treinen, R.: Easy intruder deductions. In: Dershowitz, N. (ed.) Verification: Theory and Practice. LNCS, vol. 2772. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2772
    • Comon-Lundh, H.1    Treinen, R.2
  • 31
    • 38349000750 scopus 로고    scopus 로고
    • Safely composing security protocols
    • Arvind, V, Prasad, S, eds, FSTTCS 2007, Springer, Heidelberg
    • Cortier, V., Delaitre, J., Delaune, S.: Safely composing security protocols. In: Arvind, V., Prasad, S. (eds.) FSTTCS 2007. LNCS, vol. 4855. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4855
    • Cortier, V.1    Delaitre, J.2    Delaune, S.3
  • 32
    • 38149055615 scopus 로고    scopus 로고
    • Cortier, V., Delaune, S.: Deciding knowledge in security protocols for monoidal equational theories. In: Dershowitz, N., Voronkov, A. (eds.) LPAR, 2007. LNCS (LNAI), 4790. Springer, Heidelberg (2007)
    • Cortier, V., Delaune, S.: Deciding knowledge in security protocols for monoidal equational theories. In: Dershowitz, N., Voronkov, A. (eds.) LPAR, 2007. LNCS (LNAI), vol. 4790. Springer, Heidelberg (2007)
  • 33
    • 31744441853 scopus 로고    scopus 로고
    • A survey of algebraic properties used in cryptographic protocols
    • Cortier, V., Delaune, S., Lafourcade, P.: A survey of algebraic properties used in cryptographic protocols. Journal of Computer Security 14(1), 1-43 (2006)
    • (2006) Journal of Computer Security , vol.14 , Issue.1 , pp. 1-43
    • Cortier, V.1    Delaune, S.2    Lafourcade, P.3
  • 35
    • 31344437591 scopus 로고    scopus 로고
    • Easy intruder deduction problems with homomorphisms
    • Delaune, S.: Easy intruder deduction problems with homomorphisms. Information Processing Letters 97(6), 213-218 (2006)
    • (2006) Information Processing Letters , vol.97 , Issue.6 , pp. 213-218
    • Delaune, S.1
  • 38
    • 38149058163 scopus 로고    scopus 로고
    • Delaune, S., Lin, H.: Protocol verification via rigid/flexible resolution. In: Dershowitz, N., Voronkov, A. (eds.) LPAR, 2007. LNCS (LNAI), 4790. Springer, Heidelberg (2007)
    • Delaune, S., Lin, H.: Protocol verification via rigid/flexible resolution. In: Dershowitz, N., Voronkov, A. (eds.) LPAR, 2007. LNCS (LNAI), vol. 4790. Springer, Heidelberg (2007)
  • 39
    • 0002612248 scopus 로고    scopus 로고
    • Resolution decision procedure
    • Robinson, A, Voronkov, A, eds, ch. 25, North-Holland, Amsterdam
    • Fermüller, C., Leitsch, A., Hustadt, U., Tamet, T.: Resolution decision procedure. In: Robinson, A., Voronkov, A. (eds.) Handbook of Automated Reasoning, ch. 25, vol. 2, pp. 1793-1849. North-Holland, Amsterdam (2001)
    • (2001) Handbook of Automated Reasoning , vol.2 , pp. 1793-1849
    • Fermüller, C.1    Leitsch, A.2    Hustadt, U.3    Tamet, T.4
  • 41
    • 51749119261 scopus 로고    scopus 로고
    • Küsters, R, Tuengerthal, M, Joint state theorems for public-key encryption and digital signature functionalities with local computations. In: Computer Security Foundations CSF
    • Küsters, R., Tuengerthal, M.: Joint state theorems for public-key encryption and digital signature functionalities with local computations. In: Computer Security Foundations (CSF 2008) (2008)
    • (2008)
  • 42
    • 28144456308 scopus 로고    scopus 로고
    • An attack on the Needham-Schroeder public-key authentication protocol
    • Lowe, G.: An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters 56(3), 131-133 (1996)
    • (1996) Information Processing Letters , vol.56 , Issue.3 , pp. 131-133
    • Lowe, G.1
  • 43
    • 0033353968 scopus 로고    scopus 로고
    • Towards a completeness result for model checking of security protocols
    • Lowe, G.: Towards a completeness result for model checking of security protocols. Journal of Computer Security 7(1) (1999)
    • (1999) Journal of Computer Security , vol.7 , Issue.1
    • Lowe, G.1
  • 44
    • 0027578148 scopus 로고
    • Automatic recognition of tractability in inference relations
    • McAllester, D.: Automatic recognition of tractability in inference relations. J. ACM 40(2) (1993)
    • (1993) J. ACM , vol.40 , Issue.2
    • McAllester, D.1
  • 45
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • Meadows, C.: The NRL protocol analyzer: An overview. Journal of Logic Programming 26(2), 113-131 (1996)
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 48
    • 35248886574 scopus 로고    scopus 로고
    • Tagging makes secrecy decidable with unbounded nonces as well
    • Pandya, P.K, Radhakrishnan, J, eds, FSTTCS 2003, Springer, Heidelberg
    • Ramanujam, R., Suresh, S.P.: Tagging makes secrecy decidable with unbounded nonces as well. In: Pandya, P.K., Radhakrishnan, J. (eds.) FSTTCS 2003. LNCS, vol. 2914, pp. 363-374. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2914 , pp. 363-374
    • Ramanujam, R.1    Suresh, S.P.2
  • 50
    • 84957640213 scopus 로고    scopus 로고
    • Weidenbach, C.: Towards an automatic analysis of security protocols in first-order logic. In: Ganzinger, H. (ed.) CADE 1999. LNCS (LNAI), 1632, pp. 314-328. Springer, Heidelberg (1999)
    • Weidenbach, C.: Towards an automatic analysis of security protocols in first-order logic. In: Ganzinger, H. (ed.) CADE 1999. LNCS (LNAI), vol. 1632, pp. 314-328. Springer, Heidelberg (1999)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.