TY - GEN
T1 - A logic programming based framework for security protocol verification
AU - Wang, Shujing
AU - Zhang, Yan
PY - 2008
Y1 - 2008
N2 - Security protocol analysis has been a major research topic in information security and recognised to be a notoriously hard problem. In this paper, we take the advantage of answer set programming technology to develop an effective framework to verify security protocols carrying claimed security proof under adversary models on computational complexity theory. In our approach, a security protocol, adversary actions and attacks can be formally specified within a unified logic program. Then the verification is performed in an automatic manner by computing the stable models of the underlying logic program. We use Boyd-Gonz lez Nieto conference key agreement protocol as our case study protocol to demonstrate the effectiveness and efficiency of our approach.
AB - Security protocol analysis has been a major research topic in information security and recognised to be a notoriously hard problem. In this paper, we take the advantage of answer set programming technology to develop an effective framework to verify security protocols carrying claimed security proof under adversary models on computational complexity theory. In our approach, a security protocol, adversary actions and attacks can be formally specified within a unified logic program. Then the verification is performed in an automatic manner by computing the stable models of the underlying logic program. We use Boyd-Gonz lez Nieto conference key agreement protocol as our case study protocol to demonstrate the effectiveness and efficiency of our approach.
UR - https://www.scopus.com/pages/publications/44649158296
U2 - 10.1007/978-3-540-68123-6_70
DO - 10.1007/978-3-540-68123-6_70
M3 - Conference Paper
AN - SCOPUS:44649158296
SN - 3540681221
SN - 9783540681229
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 638
EP - 643
BT - Foundations of Intelligent Systems - 17th International Symposium, ISMIS 2008, Proceedings
T2 - 17th International Symposium on Methodologies for Intelligent Systems, ISMIS 2008
Y2 - 20 May 2008 through 23 May 2008
ER -