2013
DOI: 10.3233/jcs-2012-0455
|View full text |Cite
|
Sign up to set email alerts
|

Efficient construction of machine-checked symbolic protocol security proofs

Abstract: We embed an untyped security protocol model in the interactive theorem prover Isabelle/HOL and derive a theory for constructing proofs of secrecy and authentication properties. Our theory is based on two key ingredients. The first is an inference rule for enumerating the possible origins of messages known to the intruder. The second is a class of protocol-specific invariants that formalize type assertions about variables in protocol specifications. The resulting theory is well suited for interactively construc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
17
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 11 publications
(17 citation statements)
references
References 39 publications
(78 reference statements)
0
17
0
Order By: Relevance
“…We use a version [34] of the SCYTHER-PROOF tool [30] to generate proofs of the authentication properties. Given a description of a protocol and its security properties, the tool generates a proof script that is afterwards automatically checked by the Isabelle/HOL theorem prover [33].…”
Section: Generating Machine-checked Correctness Proofsmentioning
confidence: 99%
See 3 more Smart Citations
“…We use a version [34] of the SCYTHER-PROOF tool [30] to generate proofs of the authentication properties. Given a description of a protocol and its security properties, the tool generates a proof script that is afterwards automatically checked by the Isabelle/HOL theorem prover [33].…”
Section: Generating Machine-checked Correctness Proofsmentioning
confidence: 99%
“…The interpretation mapping a message pattern to its corresponding message in the context of a thread i and the variable store σ is modeled by the family of partial functions inst σ,i : Pat Msg. In the semantics presented in [30,31], these functions were total. However, we now use partial functions because the lookup of a shared symmetric long-term key always fails if one of the variables is not instantiated to an agent name.…”
Section: A1 Bidirectional Keysmentioning
confidence: 99%
See 2 more Smart Citations
“…Over the past decade, we have conducted numerous case studies with model-checking tools for security protocols, some of which we have developed ourselves. [1][2][3][4] Our analysis shows that many standards su er from security weaknesses, including basic mistakes and well-known aws. In some cases, these weaknesses have been quite serious.…”
mentioning
confidence: 98%