2001
DOI: 10.1006/inco.2000.3020
|View full text |Cite
|
Sign up to set email alerts
|

Static Analysis for the π-Calculus with Applications to Security

Abstract: Control Flow Analysis is a static technique for predicting safe and computable approximations to the set of values that the objects of a program may assume during its execution. We present an analysis for the-calculus that shows how names will be bound to actual channels at run time. The result of our analysis establishes a super-set of the set of channels to which a given name may be bound and of the set of channels that may be sent along a given channel. Besides a set of rules that permit to validate a given… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
72
0
1

Year Published

2002
2002
2007
2007

Publication Types

Select...
6
1
1

Relationship

3
5

Authors

Journals

citations
Cited by 68 publications
(74 citation statements)
references
References 27 publications
1
72
0
1
Order By: Relevance
“…Thus, one can use the standard techniques for protocol analysis based on formal methods (e.g. type systems [1], control flow analysis [6], model checkers [9,11], etc.) to check if a given protocol is DY P -safe.…”
Section: Discussionmentioning
confidence: 99%
“…Thus, one can use the standard techniques for protocol analysis based on formal methods (e.g. type systems [1], control flow analysis [6], model checkers [9,11], etc.) to check if a given protocol is DY P -safe.…”
Section: Discussionmentioning
confidence: 99%
“…Research in this active branch of computer security has led to a variety of formal techniques; some of these are based on process algebras [8]- [11]; others on proof techniques for authentication logic [12]- [14]; some exploit type systems and other static analyses [15], [16]; yet others use automata [17]. A common analysis strategy is to test the behaviour of one's protocol specification within a hostile environment, by running it in a setting in which the presence of honest participants is complemented with a malicious adversary.…”
Section: Introductionmentioning
confidence: 99%
“…Other approaches are based on proof techniques for authentication logic (e.g., [12,13,14]). Type systems and other static analyses have also been successfully exploited (e.g., [15,16]). …”
Section: Introductionmentioning
confidence: 99%