Authors
Chiara Bodei, Mikael Buchholtz, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson
Publication date
2005/1/1
Journal
Journal of Computer Security
Volume
13
Issue
3
Pages
347-390
Publisher
IOS Press
Description
We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham–Schroeder symmetric key, Otway–Rees, Yahalom, Andrew Secure RPC, Needham–Schroeder asymmetric key, and Beller–Chang–Yacobi MSR.
Total citations
200420052006200720082009201020112012201320142015201620172018201920202021202220232111718211614141723810415413
Scholar articles
C Bodei, M Buchholtz, P Degano, F Nielson… - Journal of Computer Security, 2005