Using interpolation for the verification of security protocols

2Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Interpolation has been successfully applied in formal methods for model checking and test-case generation for sequential programs. Security protocols, however, exhibit such idiosyncrasies that make them unsuitable to the direct application of such methods. In this paper, we address this problem and present an interpolation-based method for security protocol verification. Our method starts from a formal protocol specification and combines Craig interpolation, symbolic execution and the standard Dolev-Yao intruder model to search for possible attacks on the protocol. Interpolants are generated as a response to search failure in order to prune possible useless traces and speed up the exploration. We illustrate our method by means of a concrete example and discuss the results obtained by using a prototype implementation. © 2013 Springer-Verlag.

Cite

CITATION STYLE

APA

Rocchetto, M., Viganò, L., Volpe, M., & Vedove, G. D. (2013). Using interpolation for the verification of security protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8203 LNCS, pp. 99–114). https://doi.org/10.1007/978-3-642-41098-7_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free