Automatic Validation of Protocol Narration

Chiara Bodei, Mikael Buchholtz, Pierpablo Degano, Flemming Nielson, Hanne Riis Nielson

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    Abstract

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques suffice for identifying a number of authentication flaws in symmetric key protocols such as Needham-Schroeder, Otway-Rees, Yahalom and Andrew Secure RPC.
    Original languageEnglish
    Title of host publicationProceedings of the 16th Computer Security Foundations Workshop (CSFW 03).
    PublisherIEEE Computer Society Press
    Publication date2003
    Pages126-140
    Publication statusPublished - 2003

    Fingerprint Dive into the research topics of 'Automatic Validation of Protocol Narration'. Together they form a unique fingerprint.

    Cite this