메뉴 건너뛰기




Volumn 5705 LNCS, Issue , 2009, Pages 166-194

The open-source fixed-point model checker for symbolic analysis of security protocols

Author keywords

[No Author keywords available]

Indexed keywords

ALGEBRAIC PROPERTIES; ALGEBRAIC THEORIES; CONSTRAINT-BASED; INTERMEDIATE FORMATS; MODEL CHECKER; ON-THE-FLY; OPEN-SOURCE; PARTIAL-ORDER REDUCTION; POINT-BASED; PROTOCOL GOAL; PROTOCOL VERIFICATION; REDUCTION TECHNIQUES; SECURITY PROTOCOL ANALYSIS; SECURITY PROTOCOLS; STYLE LANGUAGES; SYMBOLIC ANALYSIS; SYMBOLIC REPRESENTATION; TRANSITION SYSTEM;

EID: 70349335930     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-03829-7_6     Document Type: Conference Paper
Times cited : (36)

References (65)
  • 1
    • 28144451656 scopus 로고    scopus 로고
    • Deciding knowledge in security protocols under (many more) equational theories
    • IEEE Computer Society Press, Los Alamitos
    • Abadi, M., Cortier, V.: Deciding knowledge in security protocols under (many more) equational theories. In: Proceedings of CSFW 2005, pp. 62-76. IEEE Computer Society Press, Los Alamitos (2005)
    • (2005) Proceedings of CSFW 2005 , pp. 62-76
    • Abadi, M.1    Cortier, V.2
  • 2
    • 84885216561 scopus 로고    scopus 로고
    • On the reachability problem in cryptographic protocols
    • Palamidessi C. (ed.) CONCUR 2000. Springer, Heidelberg
    • Amadio, R.M., Lugiez, D.: On the reachability problem in cryptographic protocols. In: Palamidessi, C. (ed.) CONCUR 2000. LNCS, vol.1877, pp. 380-394. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1877 , pp. 380-394
    • Amadio, R.M.1    Lugiez, D.2
  • 4
    • 58049112239 scopus 로고    scopus 로고
    • From one session to many: Dynamic tags for security protocols
    • Cervesato, I., Veith, H., Voronkov, A. (eds.) LPAR 2008. Springer, Heidelberg
    • Arapinis, M., Delaune, S., Kremer, S.: From one session to many: Dynamic tags for security protocols. In: Cervesato, I., Veith, H., Voronkov, A. (eds.) LPAR 2008. LNCS, vol.5330, pp. 128-142. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5330 , pp. 128-142
    • Arapinis, M.1    Delaune, S.2    Kremer, S.3
  • 6
    • 35048868416 scopus 로고    scopus 로고
    • LTL model checking for security protocols
    • IEEE Computer Society Press, Los Alamitos
    • Armando, A., Carbone, R., Compagna, L.: LTL Model Checking for Security Protocols. In: Proceedings of CSF 2007, pp. 385-396. IEEE Computer Society Press, Los Alamitos (2007)
    • (2007) Proceedings of CSF 2007 , pp. 385-396
    • Armando, A.1    Carbone, R.2    Compagna, L.3
  • 11
    • 33646262130 scopus 로고    scopus 로고
    • Algebraic intruder deductions
    • Sutcli.e, G., Voronkov, A. (eds.) LPAR 2005. Springer, Heidelberg
    • Basin, D., Mödersheim, S., Viganò, L.: Algebraic intruder deductions. In: Sutcli.e, G., Voronkov, A. (eds.) LPAR 2005. LNCS (LNAI), vol.3835, pp. 549-564. Springer, Heidelberg (2005)
    • (2005) LNCS (LNAI) , vol.3835 , pp. 549-564
    • Basin, D.1    Mödersheim, S.2    Viganò, L.3
  • 13
    • 0034822279 scopus 로고    scopus 로고
    • An e.cient cryptographic protocol veri.er based on prolog rules
    • IEEE Computer Society Press, Los Alamitos
    • Blanchet, B.: An e.cient cryptographic protocol veri.er based on prolog rules. In: Proceedings of CSFW 2001, pp. 82-96. IEEE Computer Society Press, Los Alamitos (2001)
    • (2001) Proceedings of CSFW 2001 , pp. 82-96
    • Blanchet, B.1
  • 14
    • 0031074857 scopus 로고    scopus 로고
    • Fast planning through planning graph analysis
    • Blum, A.L., Furst, M.L.: Fast planning through planning graph analysis. Arti.cial Intelligence 90, 281-300 (1997)
    • (1997) Arti.cial Intelligence , vol.90 , pp. 281-300
    • Blum, A.L.1    Furst, M.L.2
  • 16
    • 70349336564 scopus 로고    scopus 로고
    • Tree automata for detecting attacks on protocols with algebraic cryptographic primitives
    • Workshop (to appear in ENTCS)
    • Boichut, Y., Héam, P.-C., Kouchnarenko, O.: Tree automata for detecting attacks on protocols with algebraic cryptographic primitives. In: Proceedings of the INFINITY 2007 Workshop (2007) (to appear in ENTCS)
    • (2007) Proceedings of the INFINITY 2007
    • Boichut, Y.1    Héam, P.-C.2    Kouchnarenko, O.3
  • 17
    • 84879529172 scopus 로고    scopus 로고
    • Symbolic trace analysis of cryptographic protocols
    • Orejas, F., Spirakis, P.G., van Leeuwen, J. (eds.) ICALP 2001. Springer, Heidelberg
    • Boreale, M.: Symbolic trace analysis of cryptographic protocols. In: Orejas, F., Spirakis, P.G., van Leeuwen, J. (eds.) ICALP 2001. LNCS, vol.2076, pp. 667-681. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2076 , pp. 667-681
    • Boreale, M.1
  • 18
    • 84874713281 scopus 로고    scopus 로고
    • A framework for the analysis of security protocols
    • Brim, L., Janicar, P., Kiretínsky, M., Kucera, A. (eds.) CONCUR 2002. Springer, Heidelberg
    • Boreale, M., Buscemi, M.G.: A framework for the analysis of security protocols. In: Brim, L., Janicar, P., Kiretínsky, M., Kucera, A. (eds.) CONCUR 2002. LNCS, vol.2421, pp. 483-498. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2421 , pp. 483-498
    • Boreale, M.1    Buscemi, M.G.2
  • 20
    • 84948759231 scopus 로고    scopus 로고
    • A formal analysis of some properties of Kerberos 5 using MSR
    • IEEE Computer Society Press, Los Alamitos
    • Butler, F., Cervesato, I., Jaggard, A., Scedrov, A.: A formal analysis of some properties of Kerberos 5 using MSR. In: Proceedings of CSFW 2002, pp. 175-190. IEEE Computer Society Press, Los Alamitos (2002)
    • (2002) Proceedings of CSFW 2002 , pp. 175-190
    • Butler, F.1    Cervesato, I.2    Jaggard, A.3    Scedrov, A.4
  • 21
    • 0033698744 scopus 로고    scopus 로고
    • Relating strands and multiset rewriting for security protocol analysis
    • IEEE Computer Society Press, Los Alamitos
    • Cervesato, I., Durgin, N.A., Lincoln, P.D., Mitchell, J.C., Scedrov, A.: Relating Strands and Multiset Rewriting for Security Protocol Analysis. In: Proceedings of CSFW 2000, pp. 35-51. IEEE Computer Society Press, Los Alamitos (2000)
    • (2000) In: Proceedings of CSFW 2000 , pp. 35-51
    • Cervesato, I.1    Durgin, N.A.2    Lincoln, P.D.3    Mitchell, J.C.4    Scedrov, A.5
  • 22
    • 35248865266 scopus 로고    scopus 로고
    • Deciding the security of protocols with di.e-hellman exponentiation and products in exponents
    • Pandya, P.K., Radhakrishnan, J. (eds.) FSTTCS 2003. Springer, Heidelberg
    • Chevalier, Y., Küsters, R., Rusinowitch, M., Turuani, M.: Deciding the security of protocols with di.e-hellman exponentiation and products in exponents. In: Pandya, P.K., Radhakrishnan, J. (eds.) FSTTCS 2003. LNCS, vol.2914, pp. 124-135. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2914 , pp. 124-135
    • Chevalier, Y.1    Küsters, R.2    Rusinowitch, M.3    Turuani, M.4
  • 23
    • 84944686372 scopus 로고    scopus 로고
    • A tool for lazy veri.cation of security protocols
    • IEEE Computer Society Press, Los Alamitos
    • Chevalier, Y., Vigneron, L.: A Tool for Lazy Veri.cation of Security Protocols. In: Proceedings of ASE 2001, pp. 373-376. IEEE Computer Society Press, Los Alamitos (2001)
    • (2001) In: Proceedings of ASE 2001 , pp. 373-376
    • Chevalier, Y.1    Vigneron, L.2
  • 24
    • 84937559950 scopus 로고    scopus 로고
    • Automated unbounded veri.cation of security protocols
    • Brinksma, E., Larsen, K.G. (eds.) CAV 2002. Springer, Heidelberg
    • Chevalier, Y., Vigneron, L.: Automated unbounded veri.cation of security protocols. In: Brinksma, E., Larsen, K.G. (eds.) CAV 2002. LNCS, vol.2404, pp. 324-337. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2404 , pp. 324-337
    • Chevalier, Y.1    Vigneron, L.2
  • 25
    • 84958742278 scopus 로고    scopus 로고
    • An improved constraint-based system for the veri.cation of security protocols
    • Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. Springer, Heidelberg
    • Corin, R., Etalle, S.: An improved constraint-based system for the veri.cation of security protocols. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol.2477, pp. 326-341. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2477 , pp. 326-341
    • Corin, R.1    Etalle, S.2
  • 27
    • 31744441853 scopus 로고    scopus 로고
    • A survey of algebraic properties used in cryptographic protocols
    • Cortier, V., Delaune, S., Lafourcade, P.: A survey of algebraic properties used in cryptographic protocols. Journal of Computer Security 14(1), 1-43 (2006)
    • (2006) Journal of Computer Security , vol.14 , Issue.1 , pp. 1-43
    • Cortier, V.1    Delaune, S.2    Lafourcade, P.3
  • 29
    • 48949088211 scopus 로고    scopus 로고
    • The scyther tool: Veri.cation, falsi.cation, and analysis of security protocols
    • Gupta, A., Malik, S. (eds.) CAV 2008. Springer, Heidelberg
    • Cremers, C.J.F.: The scyther tool: Veri.cation, falsi.cation, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol.5123, pp. 414-418. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5123 , pp. 414-418
    • Cremers, C.J.F.1
  • 31
    • 51749097358 scopus 로고    scopus 로고
    • Composition of password-based protocols
    • IEEE Computer Society Press, Los Alamitos
    • Delaune, S., Kremer, S., Ryan, M.D.: Composition of password-based protocols. In: Proceedings of CSF 2008, pp. 239-251. IEEE Computer Society Press, Los Alamitos (2008)
    • (2008) Proceedings of CSF 2008 , pp. 239-251
    • Delaune, S.1    Kremer, S.2    Ryan, M.D.3
  • 37
    • 0034829105 scopus 로고    scopus 로고
    • Computing symbolic models for verifying cryptographic protocols
    • IEEE Computer Society Press, Los Alamitos
    • Fiore, M., Abadi, M.: Computing Symbolic Models for Verifying Cryptographic Protocols. In: Proceedings of CSFW 2001, pp. 160-173. IEEE Computer Society Press, Los Alamitos (2001)
    • (2001) Proceedings of CSFW 2001 , pp. 160-173
    • Fiore, M.1    Abadi, M.2
  • 38
    • 84937389998 scopus 로고    scopus 로고
    • Rewriting for cryptographic protocol veri.cation
    • McAllester D. (ed.) CADE 2000. Springer, Heidelberg
    • Genet, T., Klay, F.: Rewriting for cryptographic protocol veri.cation. In: McAllester, D. (ed.) CADE 2000. LNCS, vol.1831, pp. 271-290. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1831 , pp. 271-290
    • Genet, T.1    Klay, F.2
  • 39
    • 84876354671 scopus 로고    scopus 로고
    • A method for automatic cryptographic protocol veri.cation
    • Rolim J.D.P. (ed.) IPDPS-WS 2000. Springer, Heidelberg
    • Goubault-Larrecq, J.: A method for automatic cryptographic protocol veri.cation. In: Rolim, J.D.P. (ed.) IPDPS-WS 2000. LNCS, vol.1800, pp. 977-984. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1800 , pp. 977-984
    • Goubault-Larrecq, J.1
  • 40
    • 3042563843 scopus 로고    scopus 로고
    • Authentication tests and disjoint encryption: A design method for security protocols
    • Guttman, J.D.: Authentication tests and disjoint encryption: a design method for security protocols. Journal of Computer Security 3-4(12), 409-433 (2004)
    • (2004) Journal of Computer Security , vol.3-4 , Issue.12 , pp. 409-433
    • Guttman, J.D.1
  • 41
    • 70349303077 scopus 로고    scopus 로고
    • Cryptographic protocol composition via the authentication tests
    • De Alfaro L. (ed.) FOSSACS 2009. Springer, Heidelberg
    • Guttman, J.D.: Cryptographic protocol composition via the authentication tests. In: de Alfaro, L. (ed.) FOSSACS 2009. LNCS, vol.5504, pp. 303-317. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5504 , pp. 303-317
    • Guttman, J.D.1
  • 42
    • 38049169637 scopus 로고    scopus 로고
    • Formalizing and analyzing sender invariance
    • Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2006. Springer, Heidelberg
    • Hankes Drielsma, P., Mödersheim, S., Viganò, L., Basin, D.: Formalizing and analyzing sender invariance. In: Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2006. LNCS, vol.4691, pp. 80-95. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4691 , pp. 80-95
    • Hankes Drielsma, P.1    Mödersheim, S.2    Viganò, L.3    Basin, D.4
  • 45
    • 70349308077 scopus 로고    scopus 로고
    • ITU-T Recommendation H.530, Corrigendum 1
    • ITU-T Recommendation H.530, Corrigendum 1 (2003); Corrected version of [44]
    • (2003) Corrected Version of [44]
  • 46
    • 84956860311 scopus 로고    scopus 로고
    • Compiling and verifying security protocols
    • Parigot, M., Voronkov, A. (eds.) LPAR 2000. Springer, Heidelberg
    • Jacquemard, F., Rusinowitch, M., Vigneron, L.: Compiling and verifying security protocols. In: Parigot, M., Voronkov, A. (eds.) LPAR 2000. LNCS, vol.1955, pp. 131-160. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1955 , pp. 131-160
    • Jacquemard, F.1    Rusinowitch, M.2    Vigneron, L.3
  • 48
    • 0030708255 scopus 로고    scopus 로고
    • A hierarchy of authentication speci.cations
    • IEEE Computer Society Press, Los Alamitos
    • Lowe, G.: A hierarchy of authentication speci.cations. In: Proceedings of CSFW 1997, pp. 31-43. IEEE Computer Society Press, Los Alamitos (1997)
    • (1997) Proceedings of CSFW 1997 , pp. 31-43
    • Lowe, G.1
  • 49
    • 0031633395 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • Lowe, G.: Casper: a Compiler for the Analysis of Security Protocols. Journal of Computer Security 6(1), 53-84 (1998)
    • (1998) Journal of Computer Security , vol.6 , Issue.1 , pp. 53-84
    • Lowe, G.1
  • 50
    • 0030232808 scopus 로고    scopus 로고
    • A calculus for security bootstrapping in distributed systems
    • Maurer, U.M., Schmid, P.E.: A calculus for security bootstrapping in distributed systems. Journal of Computer Security 4(1), 55-80 (1996)
    • (1996) Journal of Computer Security , vol.4 , Issue.1 , pp. 55-80
    • Maurer, U.M.1    Schmid, P.E.2
  • 51
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • Meadows, C.: The NRL Protocol Analyzer: An Overview. Journal of Logic Programming 26(2), 113-131 (1996)
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 52
  • 53
    • 0035751921 scopus 로고    scopus 로고
    • Constraint solving for bounded-process cryptographic protocol analysis
    • ACM Press, New York
    • Millen, J.K., Shmatikov, V.: Constraint Solving for Bounded-Process Cryptographic Protocol Analysis. In: Proceedings of CCS 2001, pp. 166-175. ACM Press, New York (2001)
    • (2001) Proceedings of CCS 2001 , pp. 166-175
    • Millen, J.K.1    Shmatikov, V.2
  • 55
    • 40149098057 scopus 로고    scopus 로고
    • On the relationships between models in protocol veri.cation
    • Mödersheim, S.: On the Relationships between Models in Protocol Veri.cation. Information and Computation 206(2-4), 291-311 (2008)
    • (2008) Information and Computation , vol.206 , Issue.2-4 , pp. 291-311
    • Mödersheim, S.1
  • 56
    • 70349673925 scopus 로고    scopus 로고
    • Algebraic properties in alice and bob notation
    • IEEE Xplore
    • Mödersheim, S.: Algebraic Properties in Alice and Bob Notation. In: Proceedings of Ares 2009, pp. 433-440. IEEE Xplore (2009)
    • (2009) Proceedings of Ares , pp. 433-440
    • Mödersheim, S.1
  • 60
    • 70349330364 scopus 로고    scopus 로고
    • Constraint di.erentiation: Search-space reduction for the constraint-based analysis of security protocols
    • to appear
    • Mödersheim, S., Viganò, L., Basin, D.: Constraint Di.erentiation: Search-Space Reduction for the Constraint-Based Analysis of Security Protocols. Journal of Computer Security (to appear)
    • Journal of Computer Security
    • Mödersheim, S.1    Viganò, L.2    Basin, D.3
  • 61
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Paulson, L.C.: The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security 6(1), 85-128 (1998)
    • (1998) Journal of Computer Security , vol.6 , Issue.1 , pp. 85-128
    • Paulson, L.C.1
  • 62
    • 84863913545 scopus 로고    scopus 로고
    • Ten Years of Partial Order Reduction
    • Computer Aided Verification
    • Peled, D.: Ten Years of Partial Order Reduction. In: Y. Vardi, M. (ed.) CAV 1998. LNCS, vol.1427, pp. 17-28. Springer, Heidelberg (1998) (Pubitemid 128092321)
    • (1998) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1427 , pp. 17-28
    • Peled, D.1
  • 65
    • 33749413267 scopus 로고    scopus 로고
    • The cl-atse protocol analyzer
    • Pfenning F. (ed.) RTA 2006. Springer, Heidelberg
    • Turuani, M.: The CL-Atse Protocol Analyser. In: Pfenning, F. (ed.) RTA 2006. LNCS, vol.4098, pp. 277-286. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4098 , pp. 277-286
    • Turuani, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.