Combining ProVerif and automated theorem provers for security protocol verification
| dc.contributor.author | Li, Darren | |
| dc.contributor.author | Tiu, Alwen | |
| dc.date.accessioned | 2023-08-08T01:02:59Z | |
| dc.date.issued | 2019 | |
| dc.date.updated | 2022-07-24T08:16:55Z | |
| dc.description.abstract | Symbolic verification of security protocols typically relies on an attacker model called the Dolev-Yao model, which does not model adequately various algebraic properties of cryptographic operators used in many real-world protocols. In this work we describe an integration of a state-of-the-art protocol verifier ProVerif, with automated first order theorem provers (ATP). The integration allows one to model directly algebraic properties of cryptographic operators as a first-order equational theory and the specified protocol can be exported to a first-order logic specification in the standard TPTP format for ATP. An attack on a protocol corresponds to a refutation using the encoded first order clauses. We implement a tool that analyses this refutation and extracts an attack trace from it, and visualises the deduction steps performed by the attacker. We show that the combination of ProVerif and ATP can find attacks that cannot be found by ProVerif when algebraic properties are taken into account in the protocol verification. | en_AU |
| dc.format.mimetype | application/pdf | en_AU |
| dc.identifier.issn | 0302-9743 | en_AU |
| dc.identifier.uri | http://hdl.handle.net/1885/295297 | |
| dc.language.iso | en_AU | en_AU |
| dc.publisher | Springer | en_AU |
| dc.rights | © 2017 The Author(s) | en_AU |
| dc.source | Lecture Notes in Computer Science (LNCS) | en_AU |
| dc.title | Combining ProVerif and automated theorem provers for security protocol verification | en_AU |
| dc.type | Journal article | en_AU |
| local.bibliographicCitation.lastpage | 365 | en_AU |
| local.bibliographicCitation.startpage | 354 | en_AU |
| local.contributor.affiliation | Li, Darren, College of Engineering and Computer Science, ANU | en_AU |
| local.contributor.affiliation | Tiu, Alwen, College of Engineering and Computer Science, ANU | en_AU |
| local.contributor.authoruid | Li, Darren, u5490127 | en_AU |
| local.contributor.authoruid | Tiu, Alwen, u4301469 | en_AU |
| local.description.embargo | 2099-12-31 | |
| local.description.notes | Imported from ARIES | en_AU |
| local.identifier.absfor | 460407 - System and network security | en_AU |
| local.identifier.absfor | 461203 - Formal methods for software | en_AU |
| local.identifier.ariespublication | a383154xPUB11850 | en_AU |
| local.identifier.ariespublication | u6662439xPUB39 | |
| local.identifier.citationvolume | 11716 LNAI | en_AU |
| local.identifier.doi | 10.1007/978-3-030-29436-6_21 | en_AU |
| local.identifier.scopusID | 2-s2.0-85077013872 | |
| local.identifier.thomsonID | WOS:000693450800021 | |
| local.publisher.url | https://link.springer.com/ | en_AU |
| local.type.status | Published Version | en_AU |
Downloads
Original bundle
1 - 1 of 1
Loading...
- Name:
- s41561-022-00946-x.pdf
- Size:
- 484.84 KB
- Format:
- Adobe Portable Document Format
- Description: