z-logo
open-access-imgOpen Access
An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols
Author(s) -
Alessandro Armando,
Luca Compagna
Publication year - 2005
Publication title -
electronic notes in theoretical computer science
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.242
H-Index - 60
ISSN - 1571-0661
DOI - 10.1016/j.entcs.2004.05.021
Subject(s) - model checking , computer science , reduction (mathematics) , satisfiability , key (lock) , theoretical computer science , boolean satisfiability problem , sequence (biology) , propositional variable , abstraction model checking , cryptographic protocol , propositional formula , protocol (science) , state (computer science) , algorithm , mathematics , cryptography , computer security , medicine , geometry , alternative medicine , pathology , biology , intermediate logic , description logic , genetics
In previous work we showed that automatic SAT-based model-checking techniques based on a reduction of protocol (in)security problems to a sequence of propositional satisfiability problems can be used to effectively find attacks on protocols. In this paper we present an optimized intruder model that may lead in many cases to shorter attacks which can be detected in our framework by generating smaller propositional formulae. The key idea is to assume that some of the abilities of the intruder have instantaneous effect, whereas in the previously adopted approach all the abilities of the intruder were modeled as state transitions. This required non trivial extensions to the SAT-reduction techniques which are formally described in the paper. Experimental results indicate the advantages of the proposed optimization

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom