Protocol Analysis

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 324 Experts worldwide ranked by ideXlab platform

John C. Mitchell - One of the best experts on this subject based on the ideXlab platform.

  • RTA - Multiset Rewriting and Security Protocol Analysis
    Rewriting Techniques and Applications, 2002
    Co-Authors: John C. Mitchell
    Abstract:

    The Dolev-Yao model of security Protocol Analysis may beformalized using a notation based on multi-set rewriting with existential quantification. This presentation describes the multiset rewriting approach to security Protocol Analysis, algorithmic upper and lower bounds on specific forms of Protocol Analysis, and some of the ways this model is useful for formalizing sublte properties of specific Protocols.

  • Multiset rewriting and security Protocol Analysis
    Lecture Notes in Computer Science, 2002
    Co-Authors: John C. Mitchell
    Abstract:

    The Dolev-Yao model of security Protocol Analysis may beformalized using a notation based on multi-set rewriting with existential quantification. This presentation describes the multiset rewriting approach to security Protocol Analysis, algorithmic upper and lower bounds on specific forms of Protocol Analysis, and some of the ways this model is useful for formalizing sublte properties of specific Protocols.

Laurent Vigneron - One of the best experts on this subject based on the ideXlab platform.

  • The AVISS security Protocol Analysis tool
    Lecture Notes in Computer Science, 2002
    Co-Authors: Alessandro Armando, Luca Vigano, David Basin, Mehdi Bouallagui, Yannick Chevalier, Luca Compagna, Sebastian Mödersheim, Michaël Rusinowitch, Mathieu Turuani, Laurent Vigneron
    Abstract:

    We introduce AVISS, a tool for security Protocol Analysis that supports the integration of back-ends implementing different search techniques, allowing for their systematic and quantitative comparison and paving the way to their effective interaction. As a significant example, we have implemented three back-ends, and used the AVISS tool to analyze and find flaws in 36 Protocols, including 31 problems in the Clark-Jacob's Protocol library and a previously unreported flaw in the Denning-Sacco Protocol.

Luca Vigano - One of the best experts on this subject based on the ideXlab platform.

  • automated security Protocol Analysis with the avispa tool
    Electronic Notes in Theoretical Computer Science, 2006
    Co-Authors: Luca Vigano
    Abstract:

    The AVISPA Tool is a push-button tool for the Automated Validation of Internet Security Protocols and Applications. It provides a modular and expressive formal language for specifying Protocols and their security properties, and integrates different back-ends that implement a variety of automatic Protocol Analysis techniques. Experimental results, carried out on a large library of Internet security Protocols, indicate that the AVISPA Tool is a state-of-the-art tool for Internet security Protocol Analysis as, to our knowledge, no other tool exhibits the same level of scope and robustness while enjoying the same performance and scalability.

  • MFPS - Automated Security Protocol Analysis With the AVISPA Tool
    Electronic Notes in Theoretical Computer Science, 2006
    Co-Authors: Luca Vigano
    Abstract:

    The AVISPA Tool is a push-button tool for the Automated Validation of Internet Security Protocols and Applications. It provides a modular and expressive formal language for specifying Protocols and their security properties, and integrates different back-ends that implement a variety of automatic Protocol Analysis techniques. Experimental results, carried out on a large library of Internet security Protocols, indicate that the AVISPA Tool is a state-of-the-art tool for Internet security Protocol Analysis as, to our knowledge, no other tool exhibits the same level of scope and robustness while enjoying the same performance and scalability.

  • The AVISS security Protocol Analysis tool
    Lecture Notes in Computer Science, 2002
    Co-Authors: Alessandro Armando, Luca Vigano, David Basin, Mehdi Bouallagui, Yannick Chevalier, Luca Compagna, Sebastian Mödersheim, Michaël Rusinowitch, Mathieu Turuani, Laurent Vigneron
    Abstract:

    We introduce AVISS, a tool for security Protocol Analysis that supports the integration of back-ends implementing different search techniques, allowing for their systematic and quantitative comparison and paving the way to their effective interaction. As a significant example, we have implemented three back-ends, and used the AVISS tool to analyze and find flaws in 36 Protocols, including 31 problems in the Clark-Jacob's Protocol library and a previously unreported flaw in the Denning-Sacco Protocol.

Zhang Feng-bin - One of the best experts on this subject based on the ideXlab platform.

Giampaolo Bella - One of the best experts on this subject based on the ideXlab platform.

  • The principle of guarantee availability for security Protocol Analysis
    International Journal of Information Security, 2010
    Co-Authors: Giampaolo Bella
    Abstract:

    Conformity to prudent design principles is an established approach to Protocol correctness although it is not free of limitations. We term goal availability a design principle that is often implicitly followed, prescribing Protocols to aim at principal-centric goals. Adherence to a design principle is normally established through Protocol Analysis that is an evaluation of whether a Protocol achieves its goals. However, the literature shows that there exists no clear guidance on how to conduct and interpret such an Analysis, a process that is only left to the analyzer’s skill and experience. Goal availability has the desirable feature that its supporting Protocol Analysis can be precisely guided by what becomes a principle of realistic Analysis, which we call guarantee availability . It prescribes that the outcome of the Analysis, which is the set of guarantees confirming the Protocol goals, be practically applicable by the Protocol participants. In consequence, the guarantees must be based on assumptions that the principals have the capacity to verify. Our focus then turns entirely to Protocol Analysis, because an Analysis conforming to guarantee availability signifies that the analyzed Protocol conforms to goal availability. Existing Analysis of (both classical and deployed) Protocols has been reconsidered with the aim of studying their conformity to guarantee availability. Some experiments clarify the relationships between goal availability and the existing design principles, with particular reference to explicitness. Other experiments demonstrate that boosting an Analysis with guarantee availability generally makes it deeper, unveiling additional Protocol niceties that depending on the analyzer’s skills may remain overseen otherwise. In particular, an established claim about a Protocol (made using a well-known formal method) can be subverted.