Automating Compositional Analysis of Authentication Protocols

2020 Formal Methods in Computer Aided Design (FMCAD)(2020)

引用 3|浏览23
暂无评分
摘要
Modern verifiers for cryptographic protocols can analyze sophisticated designs automatically, but require the entire code of the protocol to operate. Compositional techniques, by contrast, allow us to verify each system component separately, against its own guarantees and assumptions about other components and the environment. Compositionality helps protocol design because it explains how the design can evolve and when it can run safely along other protocols and programs. For example, it might say that it is safe to add some functionality to a server without having to patch the client. Unfortunately, while compositional frameworks for protocol verification do exist, they require non-trivial human effort to identify specifications for the components of the system, thus hindering their adoption. To address these shortcomings, we investigate techniques for automated, compositional analysis of authentication protocols, using automata-learning techniques to synthesize assumptions for protocol components. We report preliminary results on the Needham-Schroeder-Lowe protocol, where our synthesized assumption was capable of lowering verification time while also allowing us to verify protocol variants compositionally.
更多
查看译文
关键词
authentication protocols,modern verifiers,cryptographic protocols,sophisticated designs,entire code,compositional techniques,system component,compositionality,protocol design,compositional frameworks,protocol verification,nontrivial human effort,automated analysis,compositional analysis,automata-learning techniques,protocol components,Needham-Schroeder-Lowe protocol,synthesized assumption,protocol variants
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要