Establishing and preserving protocol security goals

@article{Guttman2014EstablishingAP,
  title={Establishing and preserving protocol security goals},
  author={Joshua D. Guttman},
  journal={Journal of Computer Security},
  year={2014},
  volume={22},
  pages={203-267}
}
We take a model-theoretic viewpoint on security goals and how to establish them. The models are possibly fragmentary executions. Security goals such as authentication and confidentiality are geometric sequents, i.e. implications Φ→Ψ where Φ and Ψ are built from atomic formulas without negations, implications, or universal quantifiers.Security goals are then statements about homomorphisms, where the source is a minimal fragmentary model of the antecedent Φ. If every homomorphism to a non… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 16 CITATIONS

Cross-Tool Semantics for Protocol Security Goals

VIEW 6 EXCERPTS
CITES METHODS & BACKGROUND

Measuring protocol strength with security goals

VIEW 6 EXCERPTS
CITES BACKGROUND

Decidability for Lightweight Diffie-Hellman Protocols

VIEW 4 EXCERPTS
CITES METHODS & BACKGROUND

Enrich-by-need Protocol Analysis for Diffie-Hellman (Extended Version)

VIEW 3 EXCERPTS
CITES BACKGROUND & METHODS

Continuous Verification for Cryptographic Protocol Development

VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 62 REFERENCES

Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR

  • Gavin Lowe
  • Computer Science
  • Software - Concepts and Tools
  • 1996
VIEW 29 EXCERPTS
HIGHLY INFLUENTIAL

Fault-Preserving Simplifying Transformations for Security Protocols

VIEW 11 EXCERPTS
HIGHLY INFLUENTIAL

Deducing Security Goals From Shape Analysis Sentences

VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

CPSA: A cryptographic protocol shapes analyzer

  • John D. Ramsdell, Joshua D. Guttman
  • http://hackage.haskell.org/package/cpsa
  • 2009
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Unbounded verification, falsification, and characterization of security protocols by pattern refinement

  • Cas J. F. Cremers
  • Computer Science
  • ACM Conference on Computer and Communications Security
  • 2008
VIEW 9 EXCERPTS
HIGHLY INFLUENTIAL

Athena: a new efficient automatic checker for security protocol analysis

  • Dawn Xiaodong Song
  • Computer Science
  • Proceedings of the 12th IEEE Computer Security Foundations Workshop
  • 1999
VIEW 11 EXCERPTS
HIGHLY INFLUENTIAL