首页 | 本学科首页   官方微博 | 高级检索  
     


Verification of Authentication Protocols for Epistemic Goals via SAT Compilation
Authors:Kai-Le Su  Qing-Liang Chen  Abdul Sattar  Wei-Ya Yue  Guan-Feng Lv  Xi-Zhong Zheng
Affiliation:1Department of Computer Science, Sun Yat-Sen University, Guangzhou 510275, P.R. China ; 2Institute for Integrated and Intelligent Systems, Griffith University, Brisbane, Qld 4111, Australia ; 3College of Computer Science and Technology, Beijing University of Technology, Beijing 100022, P.R. Chin ;4Department of Computer Science, Brandenburg University of Technology, Collbus 03046, Germany
Abstract:This paper introduces a new methodology that uses knowledge structures, a specific form of Kripke semantics for epistemic logic, to analyze communication protocols over hostile networks. The paper particularly focuses on automatic verification of authentication protocols. Our approach is based on the actual definitions of a protocol, not on some difficult-to-establish justifications. The proposed methodology is different from many previous approaches to automatic verification of security protocols in that it is justification-oriented instead of falsification-oriented, i.e., finding bugs in a protocol. The main idea is based on observations: separating a principal executing a run of protocol from the role in the protocol, and inferring a principal's knowledge from the local observations of the principal. And we show analytically and empirically that this model can be easily reduced to Satisfiability (SAT) problem and efficiently implemented by a modern SAT solver.
Keywords:authentication protocol  formal verification  knowledge structure  SAT
本文献已被 CNKI 维普 万方数据 SpringerLink 等数据库收录!
点击此处可从《计算机科学技术学报》浏览原始摘要信息
点击此处可从《计算机科学技术学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号