Using State Space Exploration and a Natural Deduction Style Message Derivation Engine to Verify Security Protocols

  • Clarke E
  • Jha S
  • Marrero W
N/ACitations
Citations of this article
12Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

As more resources are added to computer networks, and as more vendors look to the World Wide Web as a viable marketplace, the importance of being able to restrict access and to insure some kind of acceptable behavior even in the presence of malicious adversaries becomes paramount. Many researchers have proposed the use of security protocols to provide these security guarantees. We develop a method of verifying these protocols using a special purpose model checker which executes an exhaustive state space search of a protocol model. Our tool also includes a natural deduction style derivation engine which models the capabilities of the adversary trying to attack the protocol. Because our models are necessarily abstractions, we cannot prove a protocol correct. However, our tool is extremely useful as a debugger. We have used our tool to analyze 14 different authentication protocols, and have found the previously reported attacks for them. (28 References).

Cite

CITATION STYLE

APA

Clarke, E. M., Jha, S., & Marrero, W. (1998). Using State Space Exploration and a Natural Deduction Style Message Derivation Engine to Verify Security Protocols. In Programming Concepts and Methods PROCOMET ’98 (pp. 87–106). Springer US. https://doi.org/10.1007/978-0-387-35358-6_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free