Abstract
We present an approach to automated protocol analysis using the Maude rewrite system. We describe the process of translating high-level protocol specifications from the Common Authentication Protocol Specification Language (CAPSL) into an executable Maude specification. After this translation step, we dynamically extend the specification by adding an intruder agent. Based on this representation of a protocol environment, different model checkers can be applied to evaluate whether all protocol properties hold in the presence of the intruder.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Abadi, M., Needham, R.M.: Prudent engineering practice for cryptographic protocols. Software Engineering 22, 6–15 (1996), http://citeseer.nj.nec.com/abadi96prudent.html
Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Tools and Algorithms for Construction and Analysis of Systems, 147–166 (1996), http://citeseer.nj.nec.com/lowe96breaking.html
Lowe, G.: Some new attacks upon security protocols. In: PCSFW: Proceedings of The 9th Computer Security Foundations Workshop. IEEE Computer Society Press, Los Alamitos (1996), http://citeseer.nj.nec.com/article/lowe96some.html
Lowe, G.: A family of attacks upon authentication protocols. Technical report, Department of Mathematics and Computer Science, University of Leicester (1997), http://citeseer.nj.nec.com/lowe97family.html
Lowe, G.: Casper: A compiler for the analysis of security protocols. In: PCSFW: Proceedings of The 10th Computer Security Foundations Workshop. IEEE Computer Society Press, Los Alamitos (1997), http://citeseer.nj.nec.com/lowe98casper.html
Baalen, J.V., Caldwell, J.L., Mishra, S.: Specifying and checking fault-tolerant agent-based protocols using Maude. In: Rash, J.L., Rouff, C.A., Truszkowski, W., Gordon, D.F., Hinchey, M.G. (eds.) FAABS 2000. LNCS (LNAI), vol. 1871, pp. 180–193. Springer, Heidelberg (2001), http://citeseer.nj.nec.com/vanbaalen00specifying.html
Clavel, M., Durán, F., Eker, S., Lincoln, P., Martí-Oliet, N., Meseguer, J., Quesada, J.F.: Maude: Specification and programming in rewriting logic (1999); Manual distributed as documentation of the Maude system, Computer Science Laboratory, SRI International, http://maude.csl.sri.com/manual
Denker, G., Millen, J., Rueß, H.: The CAPSL integrated protocol environment. Technical Report SRI-CSL-2000-02, Computer Science Laboratory, SRI International (2000), http://www.csl.sri.com/papers/sri-csl-2000-02/
Böhne, T.: A general intruder for security protocols in Maude. Master’s thesis, University of Wyoming (2002)
Denker, G., Meseguer, J., Talcott, C.: Protocol specification and analysis in Maude. In: Proceedings of Workshop on Formal Methods and Security Protocols (1998), http://maude.csl.sri.com/papers/abstract/DMTprotocol_1998.html
Denker, G., Millen, J.: CAPSL intermediate language. In: Formal Methods and Security Protocols, CAV Workshop (1999), http://citeseer.nj.nec.com/denker99capsl.html
Denker, G.: Design of a CIL connector to Maude. In: 2000 Workshop on Formal Methods and Computer Security, Chicago, USA (2000), http://www.csl.sri.com/users/denker/publ/Den00.ps.gz
Clavel, M., Durán, F., Eker, S., Meseguer, J.: Building equational proving tools by reflection in rewriting logic. In: Proceedings of the CafeOBJ Symposium 1998, CafeOBJ Project, Numazu, Japan (1998), http://maude.csl.sri.com/papers
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Van Baalen, J., Böhne, T. (2003). Automated Protocol Analysis in Maude. In: Hinchey, M.G., Rash, J.L., Truszkowski, W.F., Rouff, C., Gordon-Spears, D. (eds) Formal Approaches to Agent-Based Systems. FAABS 2002. Lecture Notes in Computer Science(), vol 2699. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45133-4_6
Download citation
DOI: https://doi.org/10.1007/978-3-540-45133-4_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40665-5
Online ISBN: 978-3-540-45133-4
eBook Packages: Springer Book Archive