Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols


Share/Save/Bookmark

Delzanno, Giorgio and Etalle, Sandro (2001) Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols. In: 11th International Workshop on Logic Based Program Synthesis and Transformation, LOPSTR 2001, November 28-30, 2001, Paphos, Greece.

[img]
Preview
PDF
235Kb
Abstract:We define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of principals and the current global state of the session. Hereby, we can describe the operational semantics of principals and of an intruder in a simple and modular way. Furthermore, using proof theoretic tools like the analysis of permutability of rules, we are able to find efficient proof strategies that we prove complete for special classes of security protocols including Needham-Schroeder. Based on the results of this preliminary analysis, we have implemented a Prolog meta-interpreter which allows for rapid prototyping and for checking safety properties of security protocols, and we have applied it for finding error traces and proving correctness of practical examples.
Item Type:Conference or Workshop Item
Copyright:© 2001 Springer
Faculty:
Electrical Engineering, Mathematics and Computer Science (EEMCS)
Research Group:
Link to this item:http://purl.utwente.nl/publications/56150
Official URL:http://dx.doi.org/10.1007/3-540-45607-4_5
Export this item as:BibTeX
EndNote
HTML Citation
Reference Manager

 

Repository Staff Only: item control page