Elsevier

Information and Computation

Volume 206, Issues 2–4, February–April 2008, Pages 291-311
Information and Computation

On the relationships between models in protocol verification

https://doi.org/10.1016/j.ic.2007.07.006Get rights and content
Under an Elsevier user license
open archive

Abstract

We formally investigate the relationships between several models that are widely used in protocol verification, namely variants of the inductive model of message traces inspired by Paulson’s approach, and models based on rewriting. More precisely, we prove several over-approximation relationships between models, i.e. that one model allows strictly more traces or reachable states than the other. This is common in verification: often an over-approximation is easier to prove correct than the original model, and proving that the over-approximation is safe implies that the original model is safe—provided that the models are indeed in an over-approximation relation. We then show that some over-approximations are not sound with respect to a common formalization of authentication goals based on exchanged messages. The precise formal account that we give on the relation of the models allows us to correct the situation.

1991 MSC

68Q60
68Q85

Keywords

Formal verification
Security protocols
Abstraction

Cited by (0)

This paper was written while the author was working at ETH Zurich. This work was partially supported by the Zurich Information Security Center. This work represents the views of the author. The author also thanks Luca Viganò and David Basin for inspiring discussions and helpful comments.