The Logic of Authentication Protocols
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Fast automatic synthesis of security protocols using backward search
Proceedings of the 2003 ACM workshop on Formal methods in security engineering
A collaborative approach to autonomic security protocols
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
A derivation system and compositional logic for security protocols
Journal of Computer Security
Nature---Inspired Synthesis of Rational Protocols
Proceedings of the 10th international conference on Parallel Problem Solving from Nature: PPSN X
Synthesising Efficient and Effective Security Protocols
Electronic Notes in Theoretical Computer Science (ENTCS)
GECCO'03 Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartII
Towards a framework for autonomic security protocols
Proceedings of the 11th international conference on Security Protocols
Survey: A survey on search-based software design
Computer Science Review
Search-based software engineering: Trends, techniques and applications
ACM Computing Surveys (CSUR)
Fast automatic security protocol generation
Journal of Computer Security
Hi-index | 0.00 |
Tradeoffs are an important part of engineering security. Protocol security is important. So are efficiency and cost. This paper provides an early framework for handling such aspects in a uniform way based on combinatorial optimization techniques. BAN logic is viewed as both a specification and proof system and as a `protocol programming language'. The paper shows how evolutionary search in the form of genetic algorithms can be utilized to `grow' correct and efficient BAN protocols and shows how goals and assumptions can co-evolve, effectively engaging in `specification synthesis'.