Practical Approach in Verification of Security Systems Using Satisfiability Modulo Theories

Logic Journal of the IGPL 30 (2):289-300 (2022)
  Copy   BIBTEX

Abstract

The paper presents a novel method for the verification of security protocols’ time properties. The new method uses a translation to satisfiability modulo theories problem. In our approach, we model protocol users’ behaviours using networks of synchronized timed automata. Suitably specified correctness properties are defined as a reachability property of some chosen states in an automata network. Then, the network of timed automata and the property are translated to an SMT problem and checked using an SMT-solver and a BMC algorithm. We consider the most important time properties of protocol executions using specially constructed time conditions. The new method was also implemented and experimentally evaluated for six well-known SPs. We also compared our new SMT-based technique with the corresponding SAT-based approach.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 93,031

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Periodicity based decidable classes in a first order timed logic.D. Beauquier & S. Slissenko - 2006 - Annals of Pure and Applied Logic 139 (1-3):43-73.
LTL model checking for security protocols.Alessandro Armando, Roberto Carbone & Luca Compagna - 2009 - Journal of Applied Non-Classical Logics 19 (4):403-429.

Analytics

Added to PP
2020-11-04

Downloads
13 (#1,064,789)

6 months
8 (#416,172)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references