DocumentCode :
2020581
Title :
Capturing parallel attacks within the data independence framework
Author :
Broadfoot, P.J. ; Roscoe, A.W.
Author_Institution :
Comput. Lab., Oxford Univ., UK
fYear :
2002
fDate :
2002
Firstpage :
147
Lastpage :
159
Abstract :
We carry forward the work described in our previous papers (Broadfoot et al., 2000, Broadfoot and Roscoe, 2002, and Roscoe, 1998) on the application of data independence to the model checking of cryptographic protocols using CSP and FDR. In particular, we showed how techniques based on data independence could be used to justify, by means of a finite FDR check, systems where agents can perform an unbounded number of protocol runs. Whilst this allows for a more complete analysis, there was one significant incompleteness in the results we obtained: While each individual identity could perform an unlimited number of protocol runs sequentially, the degree of parallelism remained bounded. We report significant progress towards the solution of this problem, by "internalising" all or part of each agent identity within the "intruder" process. We consider the case where internal agents do introduce fresh values and address the issue of capturing the state of mind of internal agents (for the purposes of analysis).
Keywords :
communicating sequential processes; concurrency theory; cryptography; message authentication; protocols; CSP; FDR; cryptographic protocols; data independence framework; internalisation; intruder process; model checking; parallel attacks; protocol runs; Computer security; Conferences; Cryptographic protocols; Cryptography; Data security; Explosions; Laboratories; Parallel processing; Performance analysis; State-space methods;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Foundations Workshop, 2002. Proceedings. 15th IEEE
ISSN :
1063-6900
Print_ISBN :
0-7695-1689-0
Type :
conf
DOI :
10.1109/CSFW.2002.1021813
Filename :
1021813
Link To Document :
بازگشت