Constraint abstraction in verification of security protocols

  • Ti Zhou*
  • , Zhoujun Li
  • , Mengjun Li
  • , Huowang Chen
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This paper incorporates time constraints in the Horn logic model, and this extended model can verify Wide-Mouthed-Frog protocol quickly. It discusses relations between the constraint system and Horn model, abstracts the constraint system, and gives the proofs of some propositions and theorems. We also give the algorithm about how to compute the abstract constraint, and analyze its complexity. As a case study we discuss the verification of Wide-Mouthed-Frog protocol whose attack can be found quickly in new model. Therefore, the method in this paper is very effective in verification of time sensitive security protocols. In the future, we will use this method to verify some complex protocols, such as Kerberos protocol etc.

Original languageEnglish
Title of host publicationFrontiers in Algorithmics - Second International Workshop, FAW 2008, Proceedings
Pages252-263
Number of pages12
DOIs
StatePublished - 2008
Event2nd International Frontiers in Algorithmics Workshop, FAW 2008 - Changsha, China
Duration: 19 Jun 200821 Jun 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5059 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference2nd International Frontiers in Algorithmics Workshop, FAW 2008
Country/TerritoryChina
CityChangsha
Period19/06/0821/06/08

Keywords

  • Constraint system
  • Formal verification
  • Logic model
  • Security protocol
  • Time sensitive

Fingerprint

Dive into the research topics of 'Constraint abstraction in verification of security protocols'. Together they form a unique fingerprint.

Cite this