Planning Attacks to Security Protocols: Case Studies in Logic Programming

  title={Planning Attacks to Security Protocols: Case Studies in Logic Programming},
  author={Luigia Carlucci Aiello and Fabio Massacci},
  booktitle={Computational Logic: Logic Programming and Beyond},
Formal verification of security protocols has become a key issue in computer security. Yet, it has proven to be a hard task often error prone and discouraging for non-experts in formal methods. In this paper we show how security protocols can be specified and verified efficiently and effectively by embedding reasoning about actions into a logic programming language. In a nutshell, we view a protocol trace as a plan to achieve a goal, so that protocol attacks are plans achieving goals that… CONTINUE READING
7 Citations
36 References
Similar Papers


Publications referenced by this paper.
Showing 1-10 of 36 references

Similar Papers

Loading similar papers…