Indexed by:
Abstract:
This paper introduces a new methodology that uses knowledge structures, a specific form of Kripke semantics for epistemic logic, to analyze communication protocols over hostile networks. The paper particularly focuses on automatic verification of authentication protocols. Our approach is based on the actual definitions of a protocol, not on some difficult-to-establish justifications. The proposed methodology is different from many previous approaches to automatic verification of security protocols in that it is justification-oriented instead of falsification-oriented, i.e., finding bugs in a protocol. The main idea is based on observations: separating a principal executing a run of protocol from the role in the protocol, and inferring a principal's knowledge from the local observations of the principal. And we show analytically and empirically that this model can be easily reduced to Satisfiability (SAT) problem and efficiently implemented by a modern SAT solver.
Keyword:
Reprint Author's Address:
Email:
Source :
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY
ISSN: 1000-9000
Year: 2006
Issue: 6
Volume: 21
Page: 932-943
1 . 9 0 0
JCR@2022
ESI Discipline: COMPUTER SCIENCE;
JCR Journal Grade:4
Cited Count:
WoS CC Cited Count: 2
SCOPUS Cited Count: 5
ESI Highly Cited Papers on the List: 0 Unfold All
WanFang Cited Count:
Chinese Cited Count:
30 Days PV: 0