Title :
Efficient finite-state analysis for large security protocols
Author :
Shmatikov, Vitaly ; Stern, Ulrich
Author_Institution :
Dept. of Comput. Sci., Stanford Univ., CA, USA
Abstract :
The authors describe two state reduction techniques for finite-state models of security protocols. The techniques exploit certain protocol properties that they have identified as characteristic of security protocols. They prove the soundness of the techniques by demonstrating that any violation of protocol invariants is preserved in the reduced state graph. In addition, they describe an optimization method for evaluating parameterized rule conditions, which are common in models of security protocols. All three techniques have been implemented in the Murφ verifier
Keywords :
optimisation; protocols; security of data; Murφ verifier; efficient finite-state analysis; large security protocols; optimization method; parameterized rule conditions; protocol invariant violation; reduced state graph; state reduction techniques; Computer science; Computer security; Contracts; Humans; Information security; Optimization methods; Process design; Protocols; Research initiatives; US Government;
Conference_Titel :
Computer Security Foundations Workshop, 1998. Proceedings. 11th IEEE
Conference_Location :
Rockport, MA
Print_ISBN :
0-8186-8488-7
DOI :
10.1109/CSFW.1998.683160