An interpolation-based method for the verification of security protocols - Département d'informatique Accéder directement au contenu
Pré-Publication, Document De Travail Année : 2015

An interpolation-based method for the verification of security protocols

Résumé

Interpolation has been successfully applied in formal methods for model checking and test-case generation for sequential programs. Security protocols, however, exhibit such idiosyncrasies that make them unsuitable to the direct application of interpolation. We address this problem and present an interpolation-based method for security protocol verification. Our method starts from a protocol specification and combines Craig interpolation, symbolic execution and the standard Dolev-Yao intruder model to search for possible attacks on the protocol. Interpolants are generated as a response to search failure in order to prune possible useless traces and speed up the exploration. We illustrate our method by means of concrete examples and discuss the results obtained by using a prototype implementation.
Fichier principal
Vignette du fichier
spim-HAL-version.pdf (1.28 Mo) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01245442 , version 2 (04-07-2016)

Licence

Copyright (Tous droits réservés)

Identifiants

  • HAL Id : hal-01245442 , version 2

Citer

Marco Rocchetto, Luca Viganò, Marco Volpe. An interpolation-based method for the verification of security protocols. 2015. ⟨hal-01245442⟩
163 Consultations
314 Téléchargements

Partager

Gmail Facebook X LinkedIn More