2007
DOI: 10.1007/s10207-007-0041-y
|View full text |Cite
|
Sign up to set email alerts
|

SAT-based model-checking for security protocols analysis

Abstract: We present a model checking technique for security protocols based on a reduction to propositional logic. At the core of our approach is a procedure that, given a description of the protocol in a multi-set rewriting formalism and a positive integer k, builds a propositional formula whose models (if any) correspond to attacks on the protocol. Thus, finding attacks on protocols boils down to checking a propositional formula for satisfiability, problem that is usually solved very efficiently by modern SAT solvers… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
64
0
1

Year Published

2010
2010
2020
2020

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 80 publications
(65 citation statements)
references
References 58 publications
(86 reference statements)
0
64
0
1
Order By: Relevance
“…SATMC [5,6] is one of the back-ends of the AVISPA Tool [13] and has been key to the discovery of serious flaws in security protocols [14,15]. Given a planning system P S, an LTL formula φ, and a positive integer k as input, SATMC builds a propositional formula whose models (if any) correspond to initialized execution paths χ of P S of length at most k such that χ |= φ.…”
Section: From Access-controlled Workflow Systems To Planning Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…SATMC [5,6] is one of the back-ends of the AVISPA Tool [13] and has been key to the discovery of serious flaws in security protocols [14,15]. Given a planning system P S, an LTL formula φ, and a positive integer k as input, SATMC builds a propositional formula whose models (if any) correspond to initialized execution paths χ of P S of length at most k such that χ |= φ.…”
Section: From Access-controlled Workflow Systems To Planning Systemsmentioning
confidence: 99%
“…By using SATMC [5,6], a model checker for planning systems, we have detected serious flaws in our original specification of the LOP and this has led us to the definition of a new, improved version of the business process.…”
Section: Introductionmentioning
confidence: 99%
“…Both assumptions are violated by the model checking problem we consider, since (i) the models we consider are defined over a set of states which is not bounded a priori and (ii) first-order LTL formulae are allowed. In [9] we showed that the first problem can be tackled by computing a planning graph of the problem of depth k. A planning graph [17] (module Planning Graph Generator) is a succinct representation of an overapproximation of the states reachable in k steps. The planning graph is also key to reducing the first-order LTL formula (C ⇒ G) to an equivalent (in a sense that will be defined later) propositional LTL formula (via the Goal Grounding module) which is then reduced to SAT using techniques developed for bounded model checking of reactive systems [14] (via the PLTL2SAT module).…”
Section: Ltl Formula Confidential To(c P) G ∀(Rcvd(a B M C) ⇒ a =mentioning
confidence: 99%
“…, k, where each layer Γ i is a set of facts concisely representing the set of states Γ i = {S : S ⊆ Γ i }. The construction of a planning graph for M goes beyond the scope of this paper and the interested reader is referred to [9] for more details. For the purpose of this paper it suffices to know that (i) Γ 0 is set to the initial state of M , (ii) if S is reachable from the initial state of M in i steps, then S ∈ Γ i (or equivalently S ⊆ Γ i ) for i = 0, .…”
Section: Sat-based Model Checking Of Security-critical Systemsmentioning
confidence: 99%
See 1 more Smart Citation