DocumentCode
745990
Title
The Interrogator: Protocol Secuity Analysis
Author
Millen, Jonathan K. ; Clark, Sidney C. ; Freedman, Sheryl B.
Author_Institution
MITRE Corporation
Issue
2
fYear
1987
Firstpage
274
Lastpage
288
Abstract
The Interrogator is a Prolog program that searches for security vulnerabilities in network protocols for automatic cryptographic key distribution. Given a formal specification of the protocol, it looks for message modification attacks that defeat the protocol objective. It is still under developement, but is has been able to rediscover a known vulnerability in a published protocol. It is implemented in LM-Prolog on a Lisp Machine, with a graphical user interface.
Keywords
Active wiretapping; Prolog; computer security; key distribution; network security; protocol verification; Computer displays; Computer network management; Computer security; Cryptographic protocols; Cryptography; Formal specifications; Graphical user interfaces; Graphics; Mice; User interfaces; Active wiretapping; Prolog; computer security; key distribution; network security; protocol verification;
fLanguage
English
Journal_Title
Software Engineering, IEEE Transactions on
Publisher
ieee
ISSN
0098-5589
Type
jour
DOI
10.1109/TSE.1987.233151
Filename
1702206
Link To Document