Static Validation of Security Protocols

Chiara Bodei, Mikael Buchholtz, P. Degano, Hanne Riis Nielson, Flemming Nielson

    Research output: Contribution to journalJournal articleResearchpeer-review

    Abstract

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR
    Original languageEnglish
    JournalJournal of Computer Security
    Volume13
    Issue number3
    Pages (from-to)347-390
    ISSN0926-227X
    Publication statusPublished - 2005

    Bibliographical note

    11 charts

    Fingerprint

    Dive into the research topics of 'Static Validation of Security Protocols'. Together they form a unique fingerprint.

    Cite this