Athena: a novel approach to efficient automatic security protocol analysis

作者: Dawn Xiaodong Song , Sergey Berezin , Adrian Perrig

DOI: 10.3233/JCS-2001-91-203

关键词: Automated theorem provingCorrectnessCryptographic protocolRepresentation (mathematics)Theoretical computer scienceModel checkingComputer scienceProblem domainSIMPLE (military communications protocol)Protocol (object-oriented programming)

摘要: We propose a new efficient automatic verification technique, Athena, for security protocol analysis. It uses representation - our extension to the Strand Space Model, and utilizes techniques from both model checking theorem proving approaches. Athena is fully able prove correctness of many protocols with arbitrary number concurrent runs. The run time typical literature, like Needham-Schroeder protocol, often fraction second. Athena exploits several different that enable it analyze infinite sets runs achieve such efficiency. Our extended Model natural problem domain. properties are specified in simple logic which permits proof search algorithms has enough expressive power specify interesting properties. procedure borrows some proving. believe right combination compact all actually makes successful fast protocols.

参考文章(28)
Jeannette M. Wing, Darrell Kindred, Fast, automatic checking of security protocols WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2. pp. 5- 5 ,(1996)
Jeannette Wing, Nevin Heintze, J. D. Tygar, H. Chi Wong, Model checking electronic commerce protocols WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2. pp. 10- 10 ,(1996)
Catherine A. Meadows, Catherine A. Meadows, Formal Verification of Cryptographic Protocols: A Survey international cryptology conference. pp. 135- 150 ,(1994) , 10.1007/BFB0000430
E. M. Clarke, S. Jha, W. Marrero, Using state space exploration and a natural deduction style message derivation engine to verify security protocols ifip international conference on programming concepts and methods. pp. 87- 106 ,(1998) , 10.1007/978-0-387-35358-6_10
Doron Peled, Combining Partial Order Reductions with On-the-fly Model-Checking computer aided verification. pp. 377- 390 ,(1994) , 10.1007/3-540-58179-0_69
Doron Peled, All from One, One for All: on Model Checking Using Representatives computer aided verification. pp. 409- 423 ,(1993) , 10.1007/3-540-56922-7_34
Hans Rischel, Michael R. Hansen, Introduction to Programming Using Sml ,(1999)
Dawn Xiaodong Song, Adrian Perrig, A First Step Towards the Automatic Generation of Security Protocols. network and distributed system security symposium. ,(2000)
Catherine A. Meadows, Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches european symposium on research in computer security. pp. 351- 364 ,(1996) , 10.1007/3-540-61770-1_46
J.K. Millen, The Interrogator model ieee symposium on security and privacy. pp. 251- 260 ,(1995) , 10.1109/SECPRI.1995.398937