Static validation of security protocols

  • Authors:
  • Chiara Bodei;Mikael Buchholtz;Pierpaolo Degano;Flemming Nielson;Hanne Riis Nielson

  • Affiliations:
  • Dipartimento di Informatica, Università di Pisa, Pisa, Italy;Informatics and Mathematical Modelling, Technical University of Denmark, Kongens Lyngby, Denmark;Dipartimento di Informatica, Università di Pisa, Pisa, Italy;Informatics and Mathematical Modelling, Technical University of Denmark, Kongens Lyngby, Denmark;Informatics and Mathematical Modelling, Technical University of Denmark, Kongens Lyngby, Denmark

  • Venue:
  • Journal of Computer Security
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew Secure RPC, Needham-Schroeder asymmetric key. and Beller-Chang-Yacobi MSR.