Verifying security protocols with Brutus

  • Authors:
  • E. M. Clarke;S. Jha;W. Marrero

  • Affiliations:
  • Carnegie Mellon Univ., Pittsburgh, PA;Univ. of Wisconsin, Madison;DePaul Univ., Chicago, IL

  • Venue:
  • ACM Transactions on Software Engineering and Methodology (TOSEM)
  • Year:
  • 2000

Quantified Score

Hi-index 0.00

Visualization

Abstract

Due to the rapid growth of the “Internet” and the “World Wide Web” security has become a very important concern in the design and implementation of software systems. Since security has become an important issue, the number of protocols in this domain has become very large. These protocols are very diverse in nature. If a software architect wants to deploy some of these protocols in a system, they have to be sure that the protocol has the right properties as dictated by the requirements of the system. In this article we present BRUTUS, a tool for verifying properties of security protocols. This tool can be viewed as a special-purpose model checker for security protocols. We also present reduction techniques that make the tool efficient. Experimental results are provided to demonstrate the efficiency of BRUTUS.