Deduction with XOR constraints in security API modelling

  • Authors:
  • Graham Steel

  • Affiliations:
  • School of Informatics, University of Edinburgh, Edinburgh, Scotland

  • Venue:
  • CADE' 20 Proceedings of the 20th international conference on Automated Deduction
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

We introduce XOR constraints, and show how they enable a theorem prover to reason effectively about security critical subsystems which employ bitwise XOR. Our primary case study is the API of the IBM 4758 hardware security module. We also show how our technique can be applied to standard security protocols.