Static Validation of Security Protocols

Chiara Bodei, Mikael Buchholtz, P. Degano, Hanne Riis Nielson, Flemming Nielson

    Research output: Contribution to journalJournal articleResearchpeer-review


    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR
    Original languageEnglish
    JournalJournal of Computer Security
    Issue number3
    Pages (from-to)347-390
    Publication statusPublished - 2005

    Bibliographical note

    11 charts


    Dive into the research topics of 'Static Validation of Security Protocols'. Together they form a unique fingerprint.

    Cite this