Combining ProVerif and automated theorem provers for security protocol verification

dc.contributor.authorLi, Darren
dc.contributor.authorTiu, Alwen
dc.date.accessioned2023-08-08T01:02:59Z
dc.date.issued2019
dc.date.updated2022-07-24T08:16:55Z
dc.description.abstractSymbolic verification of security protocols typically relies on an attacker model called the Dolev-Yao model, which does not model adequately various algebraic properties of cryptographic operators used in many real-world protocols. In this work we describe an integration of a state-of-the-art protocol verifier ProVerif, with automated first order theorem provers (ATP). The integration allows one to model directly algebraic properties of cryptographic operators as a first-order equational theory and the specified protocol can be exported to a first-order logic specification in the standard TPTP format for ATP. An attack on a protocol corresponds to a refutation using the encoded first order clauses. We implement a tool that analyses this refutation and extracts an attack trace from it, and visualises the deduction steps performed by the attacker. We show that the combination of ProVerif and ATP can find attacks that cannot be found by ProVerif when algebraic properties are taken into account in the protocol verification.en_AU
dc.format.mimetypeapplication/pdfen_AU
dc.identifier.issn0302-9743en_AU
dc.identifier.urihttp://hdl.handle.net/1885/295297
dc.language.isoen_AUen_AU
dc.publisherSpringeren_AU
dc.rights© 2017 The Author(s)en_AU
dc.sourceLecture Notes in Computer Science (LNCS)en_AU
dc.titleCombining ProVerif and automated theorem provers for security protocol verificationen_AU
dc.typeJournal articleen_AU
local.bibliographicCitation.lastpage365en_AU
local.bibliographicCitation.startpage354en_AU
local.contributor.affiliationLi, Darren, College of Engineering and Computer Science, ANUen_AU
local.contributor.affiliationTiu, Alwen, College of Engineering and Computer Science, ANUen_AU
local.contributor.authoruidLi, Darren, u5490127en_AU
local.contributor.authoruidTiu, Alwen, u4301469en_AU
local.description.embargo2099-12-31
local.description.notesImported from ARIESen_AU
local.identifier.absfor460407 - System and network securityen_AU
local.identifier.absfor461203 - Formal methods for softwareen_AU
local.identifier.ariespublicationa383154xPUB11850en_AU
local.identifier.ariespublicationu6662439xPUB39
local.identifier.citationvolume11716 LNAIen_AU
local.identifier.doi10.1007/978-3-030-29436-6_21en_AU
local.identifier.scopusID2-s2.0-85077013872
local.identifier.thomsonIDWOS:000693450800021
local.publisher.urlhttps://link.springer.com/en_AU
local.type.statusPublished Versionen_AU

Downloads

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
s41561-022-00946-x.pdf
Size:
484.84 KB
Format:
Adobe Portable Document Format
Description: