Lazy Infinite-State Analysis of Security Protocols

  • Authors:
  • David A. Basin

  • Affiliations:
  • -

  • Venue:
  • Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
  • Year:
  • 1999

Quantified Score

Hi-index 0.00

Visualization

Abstract

Security protocols are used to exchange information in a distributed system with the aim of providing security guarantees. We present an approach to modeling security protocols using lazy data types in a higher-order functional programming language. Our approach supports the formalization of protocol models in a natural and high-level way, and the automated analysis of safety properties using infinite-state model checking, where the model is explicitly constructed in a demand-driven manner. We illustrate these ideas with an extended example: modeling and checking the Needham-Schroeder public-key authentication protocol.