Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: Selected papers from the International Conference on Computer Science, Software Engineering, Information Technology, e-Business, and Applications, 2004
Guest editors: Narayan C. Debnath
Article type: Research Article
Authors: El Kadhi, Nabila; * | El-Gendy, Hazemb
Affiliations: [a] 14-16 rue voltaire 94270 Kremelin Bicetre, France | [b] Ministry of Endownments of Egypt, 65 Al Answer Str., Mohandseen, Giza, Egypt. Tel.: +20 2 7607962; Fax: +20 2 3369686; Mobile: +20 101631692; E-mail: [email protected]
Correspondence: [*] Corresponding author. Tel.: +33 1 44 08 01 28; Fax: +33 1 44 08 01 20; E-mail: [email protected].
Abstract: Based on a previous work using abstract interpretation for secret property verification, we propose a new method for protocol verification combining abstract interpretation for Input/Output set description and finite state machine for property propagation and verification. Generating Input/Output set for FSM is a bit difficult specially when one want to apply such technique on cryptographic protocol implementation. It is true that one can verify protocol specification, but in such case one cannot discover any significant logical follows introduced by implementation. To overcome this, we develop a particular semantic defined for cryptographic protocol verification, that facilitates verifying or detecting a large set of faults and attacks. Faults and attacks will be described as scenarios with a set of preconditions and post conditions. The FSM based method is used to discover a transition is possible from an initial set (inputs) to a final state describing a fault or a global attack state. This semantic along with the model and the verification tool SSPV allow the prove of more key security properties.
Keywords: Static analysis, abstract interpretation, cryptographic protocols, network security, confidentiality, constraints, Finite State Machine
DOI: 10.3233/JCM-2006-6S109
Journal: Journal of Computational Methods in Sciences and Engineering, vol. 6, no. s1, pp. S109-S119, 2006
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]