A Calculus for Control Flow Analysis of Security Protocols

Mikael Buchholtz, Hanne Riis Nielson, Flemming Nielson

    Research output: Contribution to journalJournal articleResearchpeer-review

    404 Downloads (Orbit)

    Abstract

    The design of a process calculus for anaysing security protocols is governed by three factors: how to express the security protocol in a precise and faithful manner, how to accommodate the variety of attack scenarios, and how to utilise the strengths (and limit the weaknesses) of the underlying analysis methodology. We pursue an analysis methodology based on control flow analysis in flow logic style and we have previously shown its ability to analyse a variety of security protocols. This paper develops a calculus, LysaNS that allows for much greater control and clarity in the description of attack scenarios, that gives a more flexible format for expressing protocols, and that at the same time allows to circumvent some of the ``false positives'' arising in previous work.
    Original languageEnglish
    JournalInternational Journal of Information Security
    Volume2
    Issue number3-4
    Pages (from-to)145-167
    ISSN1615-5262
    DOIs
    Publication statusPublished - 2004

    Fingerprint

    Dive into the research topics of 'A Calculus for Control Flow Analysis of Security Protocols'. Together they form a unique fingerprint.

    Cite this