Analysis of LYSA-calculus with explicit confidentiality annotations

  • Authors:
  • Han Gao;Hanne Riis Nielson

  • Affiliations:
  • Technical University of Denmark;Technical University of Denmark

  • Venue:
  • AINA '06 Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 02
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Recently there has been an increased research interest in applying process calculi in the verification of cryptographic protocols due to their ability to formally model protocols. This work presents LYSA with explicit confidentiality annotations for indicating the expected behavior of target protocols. A static analysis approach is developed for analyzing protocols specified in the extended LYSA. The proposed approach will over-approximate the possible executions of protocols while keeping track of all messages communicated over the network, and furthermore it will capture the potential malicious activities performed by attackers as specified by the confidentiality annotations. The proposed analysis approach is fully automatic without the need of human intervention and has been applied successfully to a number of protocols.