2007
DOI: 10.1007/s10990-007-9000-6
|View full text |Cite
|
Sign up to set email alerts
|

Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
37
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 78 publications
(37 citation statements)
references
References 54 publications
0
37
0
Order By: Relevance
“…It was first used to solve equational unification problems [56] and then generalized to deal with symbolic reachability problems [57]. More formally, the difference between a rewriting step and a narrowing step is that in both cases we use a rewrite rule l ⇒ r to rewrite t at a position p (we express this subterm as t | p ), but narrowing unifies the left-hand side l and t | p ; that is, it uses a substitution σ such that lσ = A t | p σ before actually performing the rewriting step, while in rewriting t | p must be an instance of l (i.e., only matching is required).…”
Section: Searching For Causesmentioning
confidence: 99%
“…It was first used to solve equational unification problems [56] and then generalized to deal with symbolic reachability problems [57]. More formally, the difference between a rewriting step and a narrowing step is that in both cases we use a rewrite rule l ⇒ r to rewrite t at a position p (we express this subterm as t | p ), but narrowing unifies the left-hand side l and t | p ; that is, it uses a substitution σ such that lσ = A t | p σ before actually performing the rewriting step, while in rewriting t | p must be an instance of l (i.e., only matching is required).…”
Section: Searching For Causesmentioning
confidence: 99%
“…This ensures that all rewrites with rules in R must take place at the top of the term. In practice, many concurrent systems, including object-oriented systems and communication protocols, can be specified by topmost rewrite theories [16].…”
Section: Preliminariesmentioning
confidence: 99%
“…This paper further develops previous efforts to use rewriting logic and narrowing to perform symbolic model checking of infinite-state systems. 1 Those efforts have gradually increased the expressiveness of the properties that can be verified, first focusing on reachability analysis [16] and then expanding the range to general LTL formulas [1,6]. It is by now clear that state-based temporal logics are not expressive enough to deal with properties involving events, such as message sends and receives; and that the temporal logic of rewriting [14] is a perfect match-at the level of property specification-for rewriting logic-at the level of system specification-so that both can be used seamlessly as a tandem for model checking.…”
Section: Introductionmentioning
confidence: 99%
“…Narrowing [2] is a procedure that was first studied in the context of equational E-unification and that has been used in a wide range of applications [18,20]. Narrowing can be described as a modification of term rewriting in which matching is replaced by unification so, in a derivation starting from a goal expression, it is able to deduce the instantiation of the variables of the goal expression that is needed for the computation to progress.…”
Section: Introductionmentioning
confidence: 99%
“…under the term rewriting system (TRS) { f (0, 1) → 2, coin → 0, coin → 1} the term rewriting derivation f (X, X)[X/coin] → * 2 cannot be lifted by any narrowing derivation. Several variants and extensions of narrowing have been developed in order to improve that result under certain assumptions or for particular classes of term rewriting systems [19,18,9].…”
Section: Introductionmentioning
confidence: 99%