2007
DOI: 10.1016/j.entcs.2007.02.012
|View full text |Cite
|
Sign up to set email alerts
|

Protocol Composition Logic (PCL)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
106
0

Year Published

2008
2008
2018
2018

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 155 publications
(108 citation statements)
references
References 50 publications
0
106
0
Order By: Relevance
“…For a summary of the proof system and the proof of soundness of the axioms and the rules, we refer the reader to [9,38,19]. Most protocol proofs use formulas of the form θ[P ] X φ, which means that starting from a state where formula θ is true, after actions P are executed by the thread X, the formula φ is true in the resulting state.…”
Section: Overview Of Proof Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…For a summary of the proof system and the proof of soundness of the axioms and the rules, we refer the reader to [9,38,19]. Most protocol proofs use formulas of the form θ[P ] X φ, which means that starting from a state where formula θ is true, after actions P are executed by the thread X, the formula φ is true in the resulting state.…”
Section: Overview Of Proof Methodsmentioning
confidence: 99%
“…As a model checker, Murϕ is well suited for finding flaws but is insufficient to prove the correctness of a protocol. So to compliment Murϕ we use Protocol Composition Logic (PCL) [9] as a proof tool. Murϕ was useful in detecting some of the problems with the protocol specification as we first encountered it, while PCL was useful for proving that the fixes we suggested, and which were subsequently adopted, are correct.…”
Section: Introductionmentioning
confidence: 99%
“…This is however pathologic, and is a consequence of ignoring the fact that k 1 , if created by the adversary, cannot correlate with n 1 , which was not yet sent around. Furthermore, this seems to contradict their axiom (which though does not appear in their computational PCL papers) saying that FirstSend(X, t, t ′ ) ∧ a(Y, t ′′ ) → Send(X, t ′ ) < a(Y, t ′′ ) where X ̸ = Y and t subterm of t ′′ (meaning in our case that the first send action of A sending N had to occur before B could do anything with N ) in Section 4.7 of [14]. This problem persists even if such a coincidence cannot be efficiently computed.…”
Section: Our Semantics and Computational Pclmentioning
confidence: 99%
“…The analysis of cryptographic protocols [12,29,17,26,14,6,4,15] has been an active area of research. Compared with cryptographic protocols, secure routing protocols have to deal with arbitrary network topologies and the programs of the protocols are more complicated: they may access local storage and commonly include recursive computations.…”
Section: Related Workmentioning
confidence: 99%