Timed model checking of security protocols

  • Authors:
  • R. Corin;S. Etalle;P. H. Hartel;A. Mader

  • Affiliations:
  • University of Twente, The Netherlands;University of Twente, The Netherlands;University of Twente, The Netherlands;University of Twente, The Netherlands

  • Venue:
  • Proceedings of the 2004 ACM workshop on Formal methods in security engineering
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

We propose a method for engineering security protocols that are aware of timing aspects. We study a simplified version of the well-known Needham Schroeder protocol and the complete Yahalom protocol. Timing information allows us to study of different attack scenarios. We illustrate the attacks by model checking the protocol using Uppaal. We also present new challenges and threats that arise when considering time.