From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm

@inproceedings{Debbabi1997FromPS,
  title={From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm},
  author={Mourad Debbabi and Mohamed Mejri and Nadia Tawbi and I. Yahmadi},
  booktitle={WETICE},
  year={1997}
}
W e present a new approach t o the verification of authentication protocols. This approach i s formal , fully automatic and does not necessitate a n y specification of a n y protocol property or invariant. It takes as parameter the protocol specification and generates the set of flaws, if any, as well as the corresponding attack scenarios. T h i s approach involves three steps. Firs t , protocol roles are extracted f r o m the protocol specification. Second, the intruder abilities t o per form… CONTINUE READING
Highly Cited
This paper has 39 citations. REVIEW CITATIONS

Citations

Publications citing this paper.

References

Publications referenced by this paper.
Showing 1-3 of 3 references

Similar Papers

Loading similar papers…