Capturing parallel attacks within the data independence framework
- 25 June 2003
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
We carry forward the work described in our previous papers (Broadfoot et al., 2000, Broadfoot and Roscoe, 2002, and Roscoe, 1998) on the application of data independence to the model checking of cryptographic protocols using CSP and FDR. In particular, we showed how techniques based on data independence could be used to justify, by means of a finite FDR check, systems where agents can perform an unbounded number of protocol runs. Whilst this allows for a more complete analysis, there was one significant incompleteness in the results we obtained: While each individual identity could perform an unlimited number of protocol runs sequentially, the degree of parallelism remained bounded. We report significant progress towards the solution of this problem, by "internalising" all or part of each agent identity within the "intruder" process. We consider the case where internal agents do introduce fresh values and address the issue of capturing the state of mind of internal agents (for the purposes of analysis).Keywords
This publication has 10 references indexed in Scilit:
- An efficient cryptographic protocol verifier based on prolog rulesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Proving security protocols with model checkers by data independence techniquesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Equal To The Task?Published by Springer Nature ,2002
- Athena: a novel approach to efficient automatic security protocol analysis1Journal of Computer Security, 2001
- Automating Data IndependencePublished by Springer Nature ,2000
- Proving security protocols with model checkers by data independence techniquesJournal of Computer Security, 1999
- The inductive approach to verifying cryptographic protocolsJournal of Computer Security, 1998
- Casper: A compiler for the analysis of security protocolsJournal of Computer Security, 1998
- The NRL Protocol Analyzer: An OverviewThe Journal of Logic Programming, 1996
- Key Distribution Protocol for Digital Mobile Communication SystemsPublished by Springer Nature ,1990