Using encryption for authentication in large networks of computers
Communications of the ACM
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Efficient Evaluation of CSAN Models by State Space Analysis Methods
ICSEA '06 Proceedings of the International Conference on Software Engineering Advances
A framework for compositional verification of security protocols
Information and Computation
An integrated framework for security protocol analysis
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Implementation of Coloured Stochastic Activity Networks within the PDETool Framework
AMS '09 Proceedings of the 2009 Third Asia International Conference on Modelling & Simulation
A Coordination-based Methodology for Security Protocol Verification
Electronic Notes in Theoretical Computer Science (ENTCS)
A logic programming based framework for security protocol verification
ISMIS'08 Proceedings of the 17th international conference on Foundations of intelligent systems
The AVISPA tool for the automated validation of internet security protocols and applications
CAV'05 Proceedings of the 17th international conference on Computer Aided Verification
Hi-index | 0.00 |
Coloured stochastic activity networks (CSANs) are a useful formalism for modeling and analysis of computer systems and networks. PDETool is a new powerful modeling tool that supports CSANs. This paper is an attempt to propose a new approach for modeling and automatic verification of security protocols using CSANs and PDETool. In the proposed approach, the existing agents in the protocol are expressed formally as roles using the security protocols language (SPL) and then are modeled by CSANs. The approach has three steps. Firstly, the security protocol will be modeled regardless of the existence of any intruder. Secondly, different potential intruders will be modeled. Finally, by state space analysis of the model, the possibility of any security flaw in the protocol will be checked. As a case study, the Needham-Schroder and TMN protocols have been modeled and verified.