Recently there has been an increased research interest in applying process calculi in the verification of cryptographic protocols due to their ability to formally model protocols. This work presents LYSA with explicit confidentiality annotations for indicating the expected behavior of target protocols. A static analysis approach is developed for analyzing protocols specified in the extended LYSA. The proposed approach will over-approximate the possible executions of protocols while keeping track of all messages communicated over the network, and furthermore it will capture the potential malicious activities performed by attackers as specified by the confidentiality annotations. The proposed analysis approach is fully automatic without the need of human intervention and has been applied successfully to a number of protocols.
|Title of host publication||Proceeding of 20th International Conference on Advanced Information Networking and Applications|
|Publication status||Published - 2006|
|Event||20th International Conference on Advanced Information Networking and Applications - |
Duration: 1 Jan 2006 → …
|Conference||20th International Conference on Advanced Information Networking and Applications|
|Period||01/01/2006 → …|