DocumentCode :
2325628
Title :
Efficient finite-state analysis for large security protocols
Author :
Shmatikov, Vitaly ; Stern, Ulrich
Author_Institution :
Dept. of Comput. Sci., Stanford Univ., CA, USA
fYear :
1998
fDate :
9-11 Jun 1998
Firstpage :
106
Lastpage :
115
Abstract :
The authors describe two state reduction techniques for finite-state models of security protocols. The techniques exploit certain protocol properties that they have identified as characteristic of security protocols. They prove the soundness of the techniques by demonstrating that any violation of protocol invariants is preserved in the reduced state graph. In addition, they describe an optimization method for evaluating parameterized rule conditions, which are common in models of security protocols. All three techniques have been implemented in the Murφ verifier
Keywords :
optimisation; protocols; security of data; Murφ verifier; efficient finite-state analysis; large security protocols; optimization method; parameterized rule conditions; protocol invariant violation; reduced state graph; state reduction techniques; Computer science; Computer security; Contracts; Humans; Information security; Optimization methods; Process design; Protocols; Research initiatives; US Government;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Foundations Workshop, 1998. Proceedings. 11th IEEE
Conference_Location :
Rockport, MA
ISSN :
1063-6900
Print_ISBN :
0-8186-8488-7
Type :
conf
DOI :
10.1109/CSFW.1998.683160
Filename :
683160
Link To Document :
بازگشت