language-icon Old Web
English
Sign In

Model Checking Security Protocols

2018 
The formal analysis of security protocols is a prime example of a domain where model checking has been successfully applied. Although security protocols are typically small, analysis by hand is difficult as a protocol should work even when arbitrarily many runs are interleaved and in the presence of an adversary. Specialized model-checking techniques have been developed that address both the problems of unbounded, interleaved runs and a prolific, highly nondeterministic adversary. These techniques have been implemented in model-checking tools that now scale to protocols of realistic size and can be used to aid protocol design and standardization.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    111
    References
    35
    Citations
    NaN
    KQI
    []