2018 IEEE Symposium on Security and Privacy (SP) 2018
DOI: 10.1109/sp.2018.00033
|View full text |Cite
|
Sign up to set email alerts
|

DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice

Abstract: We study the automated verification of behavioural equivalences in the applied pi calculus, an essential problem in formal, symbolic analysis of cryptographic protocols. We establish new complexity results for static equivalence, trace equivalence and labelled bisimilarity and propose a new decision procedure for these equivalences. Our procedure is the first tool to decide trace equivalence and labelled bisimilarity exactly for a family of equational theories, namely those that can be represented by a subterm… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
65
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 57 publications
(80 citation statements)
references
References 40 publications
(48 reference statements)
0
65
0
Order By: Relevance
“…We may want compilation to preserve this "runs faster than" relation between the two program behaviors against arbitrary target contexts. Similarly, in any source context, the behaviors of P 1 and P 2 may be equal and we may want the compiler to preserve such trace equivalence [17,28,32] in arbitrary target contexts. This last criterion, which we call Robust Trace Equivalence Preservation (RTEP) in Figure 1, is interesting because in various determinate settings [27,42] it coincides with preserving observational equivalence, the security-relevant part of full abstraction (see §5).…”
Section: Robustly Preserving Relational Hyperpropertiesmentioning
confidence: 99%
“…We may want compilation to preserve this "runs faster than" relation between the two program behaviors against arbitrary target contexts. Similarly, in any source context, the behaviors of P 1 and P 2 may be equal and we may want the compiler to preserve such trace equivalence [17,28,32] in arbitrary target contexts. This last criterion, which we call Robust Trace Equivalence Preservation (RTEP) in Figure 1, is interesting because in various determinate settings [27,42] it coincides with preserving observational equivalence, the security-relevant part of full abstraction (see §5).…”
Section: Robustly Preserving Relational Hyperpropertiesmentioning
confidence: 99%
“…q the Helios e-voting protocol [2]. Automated analyses of this protocol exist when no revote is allowed, or is limited to one revote from a honest voter [3,16]. In this paper, we analyse several models covering revote scenarios for 7 emitted honest ballots.…”
Section: Contributionsmentioning
confidence: 99%
“…Partial order reduction techniques for equivalence properties were only introduced more recently by Baelde et al [5,6]: implementing these techniques in the APTE tool resulted in spectacular speed-ups. Other state-of-the-art tools, AKISS [14] and DeepSec [16], integrated these techniques as well. However, these existing techniques are limited in scope as they require protocols to be determinate.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…• If head((C 1 ) |q ) ≡ a (with a ∈ F ∪ N ) then, from the fact that C 0 C 1 we get that head((C 0 ) |q ) ≡ a, and that head((C 0 ) |q ) ≡ a. • If head((C 1 ) |q ) ≡ [] x then using (7) we get that We then mimic all reduction → R on C 1 by a reduction on C 0 , while maintaining and the invariant of (7). Mimicking rules in → R is easy as they are left-linear.…”
Section: B Well-nestednessmentioning
confidence: 99%