A logic programming based framework for security protocol verification

Shujing Wang, Yan Zhang, Aijun An

    Research output: Chapter in Book / Conference PaperConference Paper

    Abstract

    ![CDATA[Security protocol analysis has been a major research topic in information security and recognised to be a notoriously hard problem. In this paper, we take the advantage of answer set programming technology to develop an effective framework to verify security protocols carrying claimed security proof under adversary models on computational complexity theory. In our approach, a security protocol, adversary actions and attacks can be formally specified within a unified logic program. Then the verification is performed in an automatic manner by computing the stable models of the underlying logic program. We use Boyd-González Nieto conference key agreement protocol as our case study protocol to demonstrate the effectiveness and efficiency of our approach.]]
    Original languageEnglish
    Title of host publicationFoundations of Intelligent Systems: Proceedings of the 17th International Symposium on Methodologies for Intelligent Systems (ISMIS 2008), Toronto, Canada, May 20-23, 2008
    PublisherSpringer
    Number of pages6
    ISBN (Electronic)9783540681236
    ISBN (Print)9783540681229
    Publication statusPublished - 2008
    EventInternational Symposium on Methodologies for Intelligent Systems -
    Duration: 1 Jan 2008 → …

    Conference

    ConferenceInternational Symposium on Methodologies for Intelligent Systems
    Period1/01/08 → …

    Keywords

    • computer security
    • logic programming
    • cryptography
    • security protocols
    • verification

    Fingerprint

    Dive into the research topics of 'A logic programming based framework for security protocol verification'. Together they form a unique fingerprint.

    Cite this