Verifying security protocols with Brutus

91Citations
Citations of this article
23Readers
Mendeley users who have this article in their library.

Abstract

Due to the rapid growth of the "Internet" and the "World Wide Web" security has become a very important concern in the design and implementation of software systems. Since security has become an important issue, the number of protocols in this domain has become very large. These protocols are very diverse in nature. If a software architect wants to deploy some of these protocols in a system, they have to be sure that the protocol has the right properties as dictated by the requirements of the system. In this article we present BRUTUS, a tool for verifying properties of security protocols. This tool can be viewed as a special-purpose model checker for security protocols. We also present reduction techniques that make the tool efficient. Experimental results are provided to demonstrate the efficiency of BRUTUS.

Cite

CITATION STYLE

APA

Clarke, E. M., Jha, S., & Marrero, W. (2000). Verifying security protocols with Brutus. ACM Transactions on Software Engineering and Methodology, 9(4), 443–487. https://doi.org/10.1145/363516.363528

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free