Implementing Security Protocol Monitors - Archive ouverte HAL Access content directly
Conference Papers Year : 2021

Implementing Security Protocol Monitors

(1) , (2)
1
2

Abstract

Cryptographic protocols are often specified by narrations, i.e., finite sequences of message exchanges that show the intended execution of the protocol. Another use of narrations is to describe attacks. We propose in this paper to compile, when possible, attack describing narrations into a set of tests that honest participants can perform to exclude these executions. These tests can be implemented in monitors to protect existing implementations from rogue behaviour.
Fichier principal
Vignette du fichier
eptcs.pdf (157.36 Ko) Télécharger le fichier
Origin : Files produced by the author(s)

Dates and versions

hal-03463789 , version 1 (02-12-2021)

Identifiers

Cite

Yannick Chevalier, Michaël Rusinowitch. Implementing Security Protocol Monitors. SCSS 2021 - 9th International Symposium on Symbolic Computation in Software Science, Sep 2021, Linz/virtual, Austria. pp.22-34, ⟨10.4204/EPTCS.342.3⟩. ⟨hal-03463789⟩
36 View
35 Download

Altmetric

Share

Gmail Facebook Twitter LinkedIn More