Skip to main content

Automated Protocol Analysis in Maude

  • Conference paper
Formal Approaches to Agent-Based Systems (FAABS 2002)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 2699))

Included in the following conference series:

Abstract

We present an approach to automated protocol analysis using the Maude rewrite system. We describe the process of translating high-level protocol specifications from the Common Authentication Protocol Specification Language (CAPSL) into an executable Maude specification. After this translation step, we dynamically extend the specification by adding an intruder agent. Based on this representation of a protocol environment, different model checkers can be applied to evaluate whether all protocol properties hold in the presence of the intruder.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Abadi, M., Needham, R.M.: Prudent engineering practice for cryptographic protocols. Software Engineering 22, 6–15 (1996), http://citeseer.nj.nec.com/abadi96prudent.html

    Article  Google Scholar 

  2. Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Tools and Algorithms for Construction and Analysis of Systems, 147–166 (1996), http://citeseer.nj.nec.com/lowe96breaking.html

  3. Lowe, G.: Some new attacks upon security protocols. In: PCSFW: Proceedings of The 9th Computer Security Foundations Workshop. IEEE Computer Society Press, Los Alamitos (1996), http://citeseer.nj.nec.com/article/lowe96some.html

  4. Lowe, G.: A family of attacks upon authentication protocols. Technical report, Department of Mathematics and Computer Science, University of Leicester (1997), http://citeseer.nj.nec.com/lowe97family.html

  5. Lowe, G.: Casper: A compiler for the analysis of security protocols. In: PCSFW: Proceedings of The 10th Computer Security Foundations Workshop. IEEE Computer Society Press, Los Alamitos (1997), http://citeseer.nj.nec.com/lowe98casper.html

  6. Baalen, J.V., Caldwell, J.L., Mishra, S.: Specifying and checking fault-tolerant agent-based protocols using Maude. In: Rash, J.L., Rouff, C.A., Truszkowski, W., Gordon, D.F., Hinchey, M.G. (eds.) FAABS 2000. LNCS (LNAI), vol. 1871, pp. 180–193. Springer, Heidelberg (2001), http://citeseer.nj.nec.com/vanbaalen00specifying.html

    Chapter  Google Scholar 

  7. Clavel, M., Durán, F., Eker, S., Lincoln, P., Martí-Oliet, N., Meseguer, J., Quesada, J.F.: Maude: Specification and programming in rewriting logic (1999); Manual distributed as documentation of the Maude system, Computer Science Laboratory, SRI International, http://maude.csl.sri.com/manual

  8. Denker, G., Millen, J., Rueß, H.: The CAPSL integrated protocol environment. Technical Report SRI-CSL-2000-02, Computer Science Laboratory, SRI International (2000), http://www.csl.sri.com/papers/sri-csl-2000-02/

  9. Böhne, T.: A general intruder for security protocols in Maude. Master’s thesis, University of Wyoming (2002)

    Google Scholar 

  10. Denker, G., Meseguer, J., Talcott, C.: Protocol specification and analysis in Maude. In: Proceedings of Workshop on Formal Methods and Security Protocols (1998), http://maude.csl.sri.com/papers/abstract/DMTprotocol_1998.html

  11. Denker, G., Millen, J.: CAPSL intermediate language. In: Formal Methods and Security Protocols, CAV Workshop (1999), http://citeseer.nj.nec.com/denker99capsl.html

  12. Denker, G.: Design of a CIL connector to Maude. In: 2000 Workshop on Formal Methods and Computer Security, Chicago, USA (2000), http://www.csl.sri.com/users/denker/publ/Den00.ps.gz

  13. Clavel, M., Durán, F., Eker, S., Meseguer, J.: Building equational proving tools by reflection in rewriting logic. In: Proceedings of the CafeOBJ Symposium 1998, CafeOBJ Project, Numazu, Japan (1998), http://maude.csl.sri.com/papers

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Van Baalen, J., Böhne, T. (2003). Automated Protocol Analysis in Maude. In: Hinchey, M.G., Rash, J.L., Truszkowski, W.F., Rouff, C., Gordon-Spears, D. (eds) Formal Approaches to Agent-Based Systems. FAABS 2002. Lecture Notes in Computer Science(), vol 2699. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45133-4_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-45133-4_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40665-5

  • Online ISBN: 978-3-540-45133-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics