Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238)
DOI: 10.1109/csfw.1998.683160
|View full text |Cite
|
Sign up to set email alerts
|

Efficient finite-state analysis for large security protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
36
0

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 32 publications
(37 citation statements)
references
References 6 publications
1
36
0
Order By: Relevance
“…In [9], the authors prove the soundness of two optimizations for the intruder model. The first optimization technique lets the intruder always intercepting messages sent by the honest protocol participants, instead of making such interception optional.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In [9], the authors prove the soundness of two optimizations for the intruder model. The first optimization technique lets the intruder always intercepting messages sent by the honest protocol participants, instead of making such interception optional.…”
Section: Related Workmentioning
confidence: 99%
“…Existing intruder models [6,9,29,31,33], whether they are based on mere state space exploration or whether they combine it with natural deduction-style reasoning or "lazy" evaluation, delimit the state space branching by exploiting information about the messages that protocol participants expect. This optimization avoids generating from the intruder's knowledge, fake messages that cannot have an effect in the protocol's execution, if every protocol participant rejects them as unexpected.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Indeed, many examples of correctness of a security protocolas well as the discovery of attacks on them-may be found in the literature, e.g., [2,3,4,5,6,7,8]. Furthermore, several formal techniques have been developed.…”
Section: Introductionmentioning
confidence: 99%
“…These analysis tools are not the most recent, but they have been extensively used, also to analyze large case studies. They are Murφ and FDR, respectively [7] and [9].…”
Section: Introductionmentioning
confidence: 99%