2012 11th International Symposium on Parallel and Distributed Computing 2012
DOI: 10.1109/ispdc.2012.10
|View full text |Cite
|
Sign up to set email alerts
|

A BSP Algorithm for On-the-fly Checking LTL Formulas on Security Protocols

Abstract: Abstract-This paper presents a Bulk-Synchronous Parallel (BSP) algorithm to compute on-the-fly whether a structured model of a security protocol satisfies a LTL formula. Using the structured nature of the security protocols allows us to design a simple and efficient parallelisation of an algorithm which constructs the state-space under consideration in a need-driven fashion. A prototype implementation has been developed, allowing to run benchmarks.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2012
2012
2012
2012

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 51 publications
0
3
0
Order By: Relevance
“…In [12], we have show that using the distributed state space generation of Section II-C, states and thus assertions of the proof-structures are distributed such as a SCC (if exists) can only be local on a processor and on a slice: we compute separately the next states for succ L and succ R ; the former results in local states to be processed in the current step, while the latter results in states to be processed in the next step. That is, it is sufficient to perform sequential SCC computations on each processor and for each super-step to found flaws -an unsuccessful SCC.…”
Section: A Bsp On-the-fly Ltl Checkingmentioning
confidence: 99%
See 2 more Smart Citations
“…In [12], we have show that using the distributed state space generation of Section II-C, states and thus assertions of the proof-structures are distributed such as a SCC (if exists) can only be local on a processor and on a slice: we compute separately the next states for succ L and succ R ; the former results in local states to be processed in the current step, while the latter results in states to be processed in the next step. That is, it is sufficient to perform sequential SCC computations on each processor and for each super-step to found flaws -an unsuccessful SCC.…”
Section: A Bsp On-the-fly Ltl Checkingmentioning
confidence: 99%
“…Notice that at each super-step, each processor dumps V and E to its local disk, recording the super-step number, in order to be able to reconstruct a trace: when a state σ that invalidates the formula is found, a trace from the initial state to σ is constructed by reconstructed traces as they are locally computed and by following the proof-structure backward even on distant sending-see [12] for the details.…”
Section: A Bsp On-the-fly Ltl Checkingmentioning
confidence: 99%
See 1 more Smart Citation