The Interrogator: Protocol Secuity Analysis

  • Authors:
  • Jonathan K. Millen;Sidney C. Clark;Sheryl B. Freeman

  • Affiliations:
  • MITRE Corporation, Bedford, MA;MITRE Corporation, Bedford, MA;MIRTE Corporation, Bedford, MA

  • Venue:
  • IEEE Transactions on Software Engineering - Special issue on computer security and privacy
  • Year:
  • 1987

Quantified Score

Hi-index 0.00

Visualization

Abstract

The Interrogator is a Prolog program that searches for security vulnerabilities in network protocols for automatic cryptographic key distribution. Given a formal specification of the protocol, it looks for message modification attacks that defeat the protocol objective. It is still under developement, but is has been able to rediscover a known vulnerability in a published protocol. It is implemented in LM-Prolog on a Lisp Machine, with a graphical user interface.