A Multiset Rewriting Model for Specifying and Verifying Timing Aspects of Security Protocols

3Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Catherine Meadows has played an important role in the advancement of formal methods for protocol security verification. Her insights on the use of, for example, narrowing and rewriting logic has made possible the automated discovery of new attacks and the shaping of new protocols. Meadows has also investigated other security aspects, such as, distance-bounding protocols and denial of service attacks. We have been greatly inspired by her work. This paper describes the use of Multiset Rewriting for the specification and verification of timing aspects of protocols, such as network delays, timeouts, timed intruder models and distance-bounding properties. We detail these timed features with a number of examples and describe decidable fragments of related verification problems.

Cite

CITATION STYLE

APA

Alturki, M. A., Ban Kirigin, T., Kanovich, M., Nigam, V., Scedrov, A., & Talcott, C. (2019). A Multiset Rewriting Model for Specifying and Verifying Timing Aspects of Security Protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11565 LNCS, pp. 192–213). Springer Verlag. https://doi.org/10.1007/978-3-030-19052-1_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free