Control , and the Most Powerful Attacker

@inproceedings{Cervesato2001ControlA,
  title={Control , and the Most Powerful Attacker},
  author={Iliano Cervesato},
  year={2001}
}
Most systems designed for the verification of security proto cols operated under the unproved assumption that an attack c n only result from the combination of a fixed number of message t r nsformations, which altogether constitute the capabili ties of the so-called Dolev-Yao intruder. In this paper, we prove that the Dolev-Yao intruder can indeed emulate the actions o f an arbitrary adversary. In order to do so, we extend MSR, a flex ibl specification framework for security protocols based on… CONTINUE READING

From This Paper

Topics from this paper.

References

Publications referenced by this paper.
Showing 1-10 of 25 references

Automatically detecting most vulnerabilit ies in cryptographic protocols

  • S. Brackin
  • Proceedings of the 2000 DARPA Information…
  • 2000
3 Excerpts

Similar Papers

Loading similar papers…