Title
Security Protocol Analysis In Context: Computing Minimal Executions Using Smt And Cpsa
Abstract
Cryptographic protocols are used in different environments, but existing methods for protocol analysis focus only on the protocols, without being sensitive to assumptions about their environments.LPA is a tool that analyzes protocols in context. LPA uses two programs, cooperating with each other: CPSA, a well-known system for protocol analysis, and Razor, a model-finder based on SMT technology. Our analysis follows the enrich-by-need paradigm, in which models of protocol execution are generated and examined.The choice of which models to generate is important, and we motivate and evaluate LPA's strategy of building minimal models. "Minimality" can be defined with respect to either of two preorders, namely the homomorphism preorder and the embedding preorder ( i.e. the preorder of injective homomorphisms); we discuss the merits of each. Our main technical contributions are algorithms for building homomorphism-minimal models and for generating a set-of-support for the models of a theory, in each case by scripting interactions with an SMT solver.
Year
DOI
Venue
2018
10.1007/978-3-319-98938-9_8
INTEGRATED FORMAL METHODS, IFM 2018
Field
DocType
Volume
Programming language,Protocol analysis,Cryptographic protocol,Computer science,Computer network,Security protocol analysis
Conference
11023
ISSN
Citations 
PageRank 
0302-9743
0
0.34
References 
Authors
16
3
Name
Order
Citations
PageRank
Daniel J. Dougherty141332.13
Joshua D. Guttman21577115.55
John D. Ramsdell321918.96