• DocumentCode
    2325628
  • Title

    Efficient finite-state analysis for large security protocols

  • Author

    Shmatikov, Vitaly ; Stern, Ulrich

  • Author_Institution
    Dept. of Comput. Sci., Stanford Univ., CA, USA
  • fYear
    1998
  • fDate
    9-11 Jun 1998
  • Firstpage
    106
  • Lastpage
    115
  • Abstract
    The authors describe two state reduction techniques for finite-state models of security protocols. The techniques exploit certain protocol properties that they have identified as characteristic of security protocols. They prove the soundness of the techniques by demonstrating that any violation of protocol invariants is preserved in the reduced state graph. In addition, they describe an optimization method for evaluating parameterized rule conditions, which are common in models of security protocols. All three techniques have been implemented in the Murφ verifier
  • Keywords
    optimisation; protocols; security of data; Murφ verifier; efficient finite-state analysis; large security protocols; optimization method; parameterized rule conditions; protocol invariant violation; reduced state graph; state reduction techniques; Computer science; Computer security; Contracts; Humans; Information security; Optimization methods; Process design; Protocols; Research initiatives; US Government;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Security Foundations Workshop, 1998. Proceedings. 11th IEEE
  • Conference_Location
    Rockport, MA
  • ISSN
    1063-6900
  • Print_ISBN
    0-8186-8488-7
  • Type

    conf

  • DOI
    10.1109/CSFW.1998.683160
  • Filename
    683160