Skip to Main content Skip to Navigation
New interface
Conference papers

Verifying Cryptographic Protocols with Subterms Constraints

Yannick Chevalier 1, 2 Denis Lugiez 3 Michael Rusinowitch 4 
1 IRIT-LILaC - Logique, Interaction, Langue et Calcul
IRIT - Institut de recherche en informatique de Toulouse
4 CASSIS - Combination of approaches to the security of infinite states systems
FEMTO-ST - Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174), Inria Nancy - Grand Est, LORIA - FM - Department of Formal Methods
Abstract : Known protocol analysis techniques consider protocols where some piece of information expected in a protocol message is located at a fixed position. However this is too restrictive to model web-services where messages are XML semi-structured documents and where significant information (such as name, signature, ...) has to be extracted from nodes occurring at flexible positions. Therefore we have extended the Dolev Yao model by a subterm predicate that allows one to express data extraction by subterm matching. This also allows one to detect so-called rewriting attacks that are specific to web-services.
Document type :
Conference papers
Complete list of metadata
Contributor : Michaël Rusinowitch Connect in order to contact the contributor
Submitted on : Wednesday, January 19, 2011 - 5:48:49 PM
Last modification on : Monday, July 4, 2022 - 9:56:49 AM

Links full text



Yannick Chevalier, Denis Lugiez, Michael Rusinowitch. Verifying Cryptographic Protocols with Subterms Constraints. 14th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning - LPAR 2007, Oct 2007, Yerevan, Armenia. pp.181-195, ⟨10.1007/978-3-540-75560-9_15⟩. ⟨inria-00557710⟩



Record views