DocumentCode
2994947
Title
Athena: a new efficient automatic checker for security protocol analysis
Author
Song, Dawn Xiaodong
Author_Institution
Dept. of Comput. Sci., Carnegie Mellon Univ., Pittsburgh, PA, USA
fYear
1999
fDate
1999
Firstpage
192
Lastpage
202
Abstract
We propose an efficient automatic checking algorithm, Athena, for analyzing security protocols. Athena incorporates a logic that can express security properties including authentication, secrecy and properties related to electronic commerce. We have developed an automatic procedure for evaluating well-formed formulae in this logic. For a well-formed formula, if the evaluation procedure terminates, it will generate a counter example if the formula is false, or provide a proof if the formula is true. Even when the procedure does not terminate when we allow any arbitrary configurations of the protocol execution, (for example, any number of initiators and responders), termination could be forced by bounding the number of concurrent protocol runs and the length of messages, as is done in most existing model checkers. Athena also exploits several state space reduction techniques. It is based on an extension of the Strand Space Model (Thayer et al., 1998) which captures exact causal relation information. Together with backward search and other techniques, Athena naturally avoids the state space explosion problem commonly caused by asynchronous composition and symmetry redundancy. Athena also has the advantage that it can easily incorporate results from theorem proving through unreachability theorems. By using the unreachability theorems, it can prune the state space at an early stage, hence, reduce the state space explored and increase the likelihood of termination. As shown in our experiments, these techniques dramatically reduce the state space that needs to be explored
Keywords
backtracking; electronic commerce; formal logic; formal verification; protocols; security of data; theorem proving; Athena; Strand Space Model; authentication; automatic checking algorithm; backward search; causal relation information; electronic commerce; logic; messages; model checkers; secrecy; security protocol analysis; state space reduction techniques; theorem proving; unreachability theorems; well-formed formula; Algorithm design and analysis; Authentication; Automatic logic units; Counting circuits; Electronic commerce; Explosions; Protocols; Security; Space exploration; State-space methods;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Security Foundations Workshop, 1999. Proceedings of the 12th IEEE
Conference_Location
Mordano
ISSN
1063-6900
Print_ISBN
0-7695-0201-6
Type
conf
DOI
10.1109/CSFW.1999.779773
Filename
779773
Link To Document