2006
DOI: 10.1007/s10703-006-0004-3
|View full text |Cite
|
Sign up to set email alerts
|

Cones and foci: A mechanical framework for protocol verification

Abstract: We define a cones and foci proof method, which rephrases the question whether two system specifications are branching bisimilar in terms of proof obligations on relations between data objects. Compared to the original cones and foci method from Groote and Springintveld, our method is more generally applicable, because it does not require a preprocessing step to eliminate τ -loops. We prove soundness of our approach and present a set of rules to prove the reachability of focus points. Our method has been formal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2007
2007
2022
2022

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 42 publications
0
6
0
Order By: Relevance
“…Yet, it seems worthwhile to also take inspiration from simulation and simulation distance approaches [1,29] in this matter. Another avenue that is worth exploring is to consider branching instead of weak bisimulation [28], not only because our notion of border states fits particularly well to that setting [12]. We conjecture that requiring the underlying weak bisimulations to be branching is enough to achieve the corresponding transitivity and compositional properties, as well as polynomial decision algorithms.…”
Section: Discussionmentioning
confidence: 91%
“…Yet, it seems worthwhile to also take inspiration from simulation and simulation distance approaches [1,29] in this matter. Another avenue that is worth exploring is to consider branching instead of weak bisimulation [28], not only because our notion of border states fits particularly well to that setting [12]. We conjecture that requiring the underlying weak bisimulations to be branching is enough to achieve the corresponding transitivity and compositional properties, as well as polynomial decision algorithms.…”
Section: Discussionmentioning
confidence: 91%
“…In the literature, a proof method for checking branching bisimilarity [19,20] is formalized in the theorem prover PVS. But this approach cannot be directly applied for security protocol analysis (see e.g., [34]) as it does not deal with message indistinguishability.…”
Section: Related Workmentioning
confidence: 99%
“…We provided a sound and complete axiomatization for CNT terms with finite-state behaviors, modulo so-called rooted branching computed network bisimilarity. This axiomatization enables linearization of processes at the syntactic level to take advantage of symbolic verification [25,26], especially when the network is composed of similar nodes [27,28].…”
Section: Introductionmentioning
confidence: 99%