Verifying Regular Trace Properties of Security Protocols with Explicit Destructors and Implicit Induction - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2007

Verifying Regular Trace Properties of Security Protocols with Explicit Destructors and Implicit Induction

Adel Bouhoula
  • Fonction : Auteur
  • PersonId : 756484
  • IdRef : 132449021
Florent Jacquemard

Résumé

We present a procedure for the verification of cryptographic protocols based on a new method for automatic implicit induction theorem proving for specifications made of conditional and constrained rewrite rules. The method handles axioms between constructor terms which are used to introduce explicit destructor symbols for the specification of cryptographic operators. Moreover, it can deal with non-confluent rewrite systems. This is required in the context of the verification of security protocols because of the non-deterministic behavior of attackers. Our induction method makes an intensive use of constrained tree grammars, which are used in proofs both as induction schemes and as oracles for checking validity and redundancy criteria by reduction to an emptiness problem. The grammars make possible the development of a generic framework for the specification and verification of protocols, where the specifications can be parametrized with (possibly infinite) regular sets of user names or attacker’s initial knowledge and complex security properties can be expressed, referring to some fixed regular sets of bad traces representing potential vulnerabilities. We present some case studies giving very promising results, for the detection of attacks (our procedure is complete for refutation), and also for the validation of protocols.
Fichier principal
Vignette du fichier
BJ-arspa07.pdf (378.02 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

inria-00579015 , version 1 (22-03-2011)

Identifiants

  • HAL Id : inria-00579015 , version 1

Citer

Adel Bouhoula, Florent Jacquemard. Verifying Regular Trace Properties of Security Protocols with Explicit Destructors and Implicit Induction. Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS-ARSPA), Jul 2007, Poland. pp.27-44. ⟨inria-00579015⟩
112 Consultations
154 Téléchargements

Partager

Gmail Facebook X LinkedIn More