Formal Models for Analyzing Security Protocols: Some Lecture Notes

Véronique Cortier and Steve Kremer. Formal Models for Analyzing Security Protocols: Some Lecture Notes. In Javier Esparza, Orna Grumberg, and Salomon Sickert, editors, Dependable Software Systems Engineering, NATO Science for Peace and Security Series - D: Information and Communication Securit, pp. 33–58, IOS Press, 2016.
doi:10.3233/978-1-61499-627-9-33

Download

[HTML] 

Abstract

Security protocols are distributed programs that aim at securing communications by the means of cryptography. They are for instance used to secure electronic payments, home banking and more recently electronic elections. Given the financial and societal impact in case of failure, and the long history of design flaws in such protocols, formal verification is a necessity. A major difference from other safety critical systems is that the properties of security protocols must hold in the presence of an arbitrary adversary. The aim of these notes is to provide a tutorial to some modern approaches for formally modeling protocols, their goals and automatically verifying them.

BibTeX

@InCollection{CK-marktoberdorf16,
  abstract =	 {Security protocols are distributed programs that aim
                  at securing communications by the means of
                  cryptography. They are for instance used to secure
                  electronic payments, home banking and more recently
                  electronic elections. Given the financial and
                  societal impact in case of failure, and the long
                  history of design flaws in such protocols, formal
                  verification is a necessity. A major difference from
                  other safety critical systems is that the properties
                  of security protocols must hold in the presence of
                  an arbitrary adversary. The aim of these notes is to
                  provide a tutorial to some modern approaches for
                  formally modeling protocols, their goals and
                  automatically verifying them.},
  author =	 {V{\'{e}}ronique Cortier and Steve Kremer},
  title =	 {Formal Models for Analyzing Security Protocols: Some
                  Lecture Notes},
  booktitle =	 {Dependable Software Systems Engineering},
  publisher =	 {{IOS} Press},
  year =	 2016,
  editor =	 {Javier Esparza and Orna Grumberg and Salomon
                  Sickert},
  volume =	 45,
  series =	 {{NATO} Science for Peace and Security Series - {D:}
                  Information and Communication Securit},
  pages =	 {33--58},
  isbn =	 {978-1-61499-626-2},
  url =		 {https://doi.org/10.3233/978-1-61499-627-9-33},
  doi =		 {10.3233/978-1-61499-627-9-33},
}