Deterministic tree pushdown automata and monadic tree rewriting systems
Journal of Computer and System Sciences
Bottom-up tree pushdown automata and rewrite systems
RTA-91 Proceedings of the 4th international conference on Rewriting techniques and applications
Term rewriting and all that
Introduction To Automata Theory, Languages, And Computation
Introduction To Automata Theory, Languages, And Computation
Decidable Approximations of Term Rewriting Systems
RTA '96 Proceedings of the 7th International Conference on Rewriting Techniques and Applications
CAV '02 Proceedings of the 14th International Conference on Computer Aided Verification
Extrapolating Tree Transformations
CAV '02 Proceedings of the 14th International Conference on Computer Aided Verification
Rewriting for Cryptographic Protocol Verification
CADE-17 Proceedings of the 17th International Conference on Automated Deduction
Reachability Analysis over Term Rewriting Systems
Journal of Automated Reasoning
A survey of algebraic properties used in cryptographic protocols
Journal of Computer Security
Abstract Regular Tree Model Checking
Electronic Notes in Theoretical Computer Science (ENTCS)
Pattern-based abstraction for verifying secrecy in protocols
TACAS'03 Proceedings of the 9th international conference on Tools and algorithms for the construction and analysis of systems
Rewriting approximations for fast prototyping of static analyzers
RTA'07 Proceedings of the 18th international conference on Term rewriting and applications
Abstract regular tree model checking of complex dynamic data structures
SAS'06 Proceedings of the 13th international conference on Static Analysis
Handling algebraic properties in automatic analysis of security protocols
ICTAC'06 Proceedings of the Third international conference on Theoretical Aspects of Computing
Automatic detection of attacks on cryptographic protocols: a case study
DIMVA'05 Proceedings of the Second international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Regular Tree Languages And Rewrite Systems
Fundamenta Informaticae
Tree Automata for Detecting Attacks on Protocols with Algebraic Cryptographic Primitives
Electronic Notes in Theoretical Computer Science (ENTCS)
Hi-index | 0.00 |
This paper addresses the following general problem of tree regular model-checking: decide whether R^*(L)@?L"p=@A where R^* is the reflexive and transitive closure of a successor relation induced by a term rewriting system R, and L and L"p are both regular tree languages. We develop an automatic approximation-based technique to handle this - undecidable in general - problem in the case when term rewriting system rules are left-quadratic. The most common practical case is handled this way.