Security protocols verification in abductive logic programming: a case study

  • Authors:
  • Marco Alberti;Federico Chesani;Marco Gavanelli;Evelina Lamma;Paola Mello;Paolo Torroni

  • Affiliations:
  • ENDIF, Università di Ferrara, Ferrara, Italy;DEIS, Università di Bologna, Bologna, Italy;ENDIF, Università di Ferrara, Ferrara, Italy;ENDIF, Università di Ferrara, Ferrara, Italy;DEIS, Università di Bologna, Bologna, Italy;DEIS, Università di Bologna, Bologna, Italy

  • Venue:
  • ESAW'05 Proceedings of the 6th international conference on Engineering Societies in the Agents World
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we present by a case study an approach to the verification of security protocols based on Abductive Logic Programming. We start from the perspective of open multi-agent systems, where the internal architecture of the individual system's components may not be completely specified, but it is important to infer and prove properties about the overall system behaviour. We take a formal approach based on Computational Logic, to address verification at two orthogonal levels: ‘static' verification of protocol properties (which can guarantee, at design time, that some properties are a logical consequence of the protocol), and ‘dynamic' verification of compliance of agent communication (which checks, at runtime, that the agents do actually follow the protocol). In order to explain the approach, we adopt as a running example the well-known Needham-Schroeder protocol. We first show how the protocol can be specified in our previously developed SOCS-SI framework, and then demonstrate the two types of verification. We also demonstrate the use of the SOCS-SI framework for the static verification of the NetBill e-commerce protocol.