메뉴 건너뛰기




Volumn , Issue , 2008, Pages 119-128

Unbounded verification, falsification, and characterization of security protocols by pattern refinement

Author keywords

Characterization; Falsification; Security protocol analysis; Unbounded verification

Indexed keywords

FALSIFICATION; MULTIPROTOCOLS; PROTOCOL ANALYSIS; SECURITY PROTOCOL ANALYSIS; SECURITY PROTOCOLS; STATE-OF-THE-ART PERFORMANCE; UNBOUNDED VERIFICATION; VERIFICATION ALGORITHMS;

EID: 67650240831     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1455770.1455787     Document Type: Conference Paper
Times cited : (47)

References (31)
  • 2
    • 48949100658 scopus 로고    scopus 로고
    • M. Backes, S. Lorenz, M. Maffei, and K. Pecina. The CASPA tool: Causality-based abstraction for security protocol analysis. In A. Gupta and S. Malik, editors. CAV, 5123 of Lecture Notes in Computer Science, pages 419-422. Springer, 2008.
    • M. Backes, S. Lorenz, M. Maffei, and K. Pecina. The CASPA tool: Causality-based abstraction for security protocol analysis. In A. Gupta and S. Malik, editors. CAV, volume 5123 of Lecture Notes in Computer Science, pages 419-422. Springer, 2008.
  • 5
    • 70349268845 scopus 로고    scopus 로고
    • S. Berezin. Extensions to Athena: Constraint satisfiability problem and new pruning theorems based on type system extensions for messages. http://www. sergeyberezin.com/papers/athena-exteiisions.ps (unpublished manuscript), 2001.
    • S. Berezin. Extensions to Athena: Constraint satisfiability problem and new pruning theorems based on type system extensions for messages. http://www. sergeyberezin.com/papers/athena-exteiisions.ps (unpublished manuscript), 2001.
  • 6
    • 0034822279 scopus 로고    scopus 로고
    • An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
    • Cape Breton, June, IEEE Computer Society
    • B. Blanchet. An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In Proc. 14th IEEE Computer Security Foundations Workshop (CSFW), pages 82-96, Cape Breton, June 2001. IEEE Computer Society.
    • (2001) Proc. 14th IEEE Computer Security Foundations Workshop (CSFW) , pp. 82-96
    • Blanchet, B.1
  • 11
    • 84958742278 scopus 로고    scopus 로고
    • An improved constraint-based system for the verification of security protocols
    • Proc. 9th International Static Analysis Symposium SAS, of, Spain, Sep, Springer
    • R. Corin and S. Etalle. An improved constraint-based system for the verification of security protocols. In Proc. 9th International Static Analysis Symposium (SAS), volume 2477 of Lecture Notes in Computer Science, pages 326-341, Spain, Sep 2002. Springer.
    • (2002) Lecture Notes in Computer Science , vol.2477 , pp. 326-341
    • Corin, R.1    Etalle, S.2
  • 15
    • 24944514681 scopus 로고    scopus 로고
    • Operational semantics of security protocols
    • Scenarios: Models. Transformations and Tools, International Workshop, 2003, Revised Selected Papers, of, Springer
    • C. Cremers and S. Mauw. Operational semantics of security protocols. In Scenarios: Models. Transformations and Tools, International Workshop, 2003, Revised Selected Papers, volume 3466 of Lecture Notes in Computer Science. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3466
    • Cremers, C.1    Mauw, S.2
  • 16
    • 33847679489 scopus 로고    scopus 로고
    • S. Doghmi, J. D. Guttman, and F. Thayer. Skeletons, homomorphisms, and shapes: Characterizing protocol executions. In Proc. of the 23rd Conf. on the Mathematical Foundations of Programming Semantics (MFPS XXIII), 173 of Electronic Notes in Theoretical Computer Science, pages 85-102. Elsevier ScienceDirect, April 2007.
    • S. Doghmi, J. D. Guttman, and F. Thayer. Skeletons, homomorphisms, and shapes: Characterizing protocol executions. In Proc. of the 23rd Conf. on the Mathematical Foundations of Programming Semantics (MFPS XXIII), volume 173 of Electronic Notes in Theoretical Computer Science, pages 85-102. Elsevier ScienceDirect, April 2007.
  • 17
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • Mar
    • D. Dolev and A. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, 29(12):198-208, Mar. 1983.
    • (1983) IEEE Transactions on Information Theory , vol.29 , Issue.12 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 19
    • 84855186480 scopus 로고    scopus 로고
    • Pattern-matching spi-calculus
    • C. Haack and A. Jeffrey. Pattern-matching spi-calculus. Inf. Cornput., 204(8):1195-1263, 2006.
    • (2006) Inf. Cornput , vol.204 , Issue.8 , pp. 1195-1263
    • Haack, C.1    Jeffrey, A.2
  • 20
    • 70349281193 scopus 로고    scopus 로고
    • F. O. P. IST-2001-39252. AVISPA: Automated validation of internet security protocols and applications, 2003.
    • F. O. P. IST-2001-39252. AVISPA: Automated validation of internet security protocols and applications, 2003.
  • 21
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Proc. 2nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems TACAS, of, Springer
    • G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Proc. 2nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), volume 1055 of Lecture Notes in Computer Science, pages 147-166. Springer, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 22
    • 0030678388 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • IEEE Computer Society
    • G. Lowe. Casper: A compiler for the analysis of security protocols. In Proc. 10th IEEE Computer Security Foundations Workshop (CSFW), pages 18-30. IEEE Computer Society, 1997.
    • (1997) Proc. 10th IEEE Computer Security Foundations Workshop (CSFW) , pp. 18-30
    • Lowe, G.1
  • 23
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • C.Meadows. The NRL protocol analyzer: An overview. Journal of Logic Programming, 26(2):113-131, 1996.
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 24
    • 70349288877 scopus 로고    scopus 로고
    • S. Meier. A formalization of an operational semantics of security protocols. Diploma thesis, ETH Zurich, August 2007. http: //people.inf.ethz.ch/ meiersi/fossp/index.html.
    • S. Meier. A formalization of an operational semantics of security protocols. Diploma thesis, ETH Zurich, August 2007. http: //people.inf.ethz.ch/ meiersi/fossp/index.html.
  • 26
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.1
  • 28
    • 0035072287 scopus 로고    scopus 로고
    • Athena: A novel approach to efficient automatic security protocol analysis
    • 9(l/2):47-74
    • D. Song, S, Berezin, and A, Perrig. Athena: A novel approach to efficient automatic security protocol analysis. Journal of Computer Security, 9(l/2):47-74, 2001.
    • (2001) Journal of Computer Security
    • Song, D.1    Berezin, S.2    Perrig, A.3
  • 31
    • 33749413267 scopus 로고    scopus 로고
    • The CL-Atse protocol analyser
    • Proc. RTA '06, of, Springer, Aug
    • M. Turuani. The CL-Atse protocol analyser. In Proc. RTA '06, volume 4098 of Lecture Notes in Computer Science, pages 227-286. Springer, Aug. 2006.
    • (2006) Lecture Notes in Computer Science , vol.4098 , pp. 227-286
    • Turuani, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.