Skip to Main content Skip to Navigation
Conference papers

Using Backward Induction Techniques in (Timed) Security Protocols Verification

Abstract : This paper shows a new way of automatic verification of properties of untimed and timed security protocols. To do this we use a modified version of previously introduced formal model based on a network of synchronized (timed) automata that expreses behaviour and distributed knowledge of users during protocol executions. In our new approach we will use the backward induction method for searching of a tree of all real executions of an investigated protocol. Our approach uses additionally the boolean encoding of constructed structures and SAT solvers for searching answers to the questions about investigated properties which are expressed as reachability or unreachability of undesired states in a considered model. We exemplify all our notions and formalisms on the well known NSPK, and show experimental results for checking authentication and security properties of a few untimed and timed protocols.
Complete list of metadata

Cited literature [26 references]  Display  Hide  Download

https://hal.inria.fr/hal-01496073
Contributor : Hal Ifip <>
Submitted on : Monday, March 27, 2017 - 11:01:24 AM
Last modification on : Tuesday, March 28, 2017 - 1:07:11 AM
Long-term archiving on: : Wednesday, June 28, 2017 - 1:13:46 PM

File

978-3-642-40925-7_25_Chapter.p...
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Citation

Mirosław Kurkowski, Olga Siedlecka-Lamch, Paweł Dudek. Using Backward Induction Techniques in (Timed) Security Protocols Verification. 12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.265-276, ⟨10.1007/978-3-642-40925-7_25⟩. ⟨hal-01496073⟩

Share

Metrics

Record views

198

Files downloads

226