Static Validation of Security Protocols

Chiara Bodei, Mikael Buchholtz, Pierpaolo Degano, Hanne Riis Nielson, Flemming Nielson

AbstractWe methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew Secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR.
TypeJournal paper [With referee]
JournalJournal of Computer Security
Year2005    Vol. 13    No. 3    pp. 347-390
Electronic version(s)[pdf]
BibTeX data [bibtex]
IMM Group(s)Computer Science & Engineering