YAPA: A generic tool for computing intruder knowledge
YAPA: A generic tool for computing intruder knowledge. Mathieu Baudet, Véronique Cortier, and Stéphanie Delaune. ACM Transactions on Computational Logic, 14, ACM Press, 2013.
Download
Abstract
Reasoning about the knowledge of an attacker is a necessary step in many formal analyses of security protocols. In the framework of the applied pi calculus, as in similar languages based on equational logics, knowledge is typically expressed by two relations: deducibility and static equivalence. Several decision procedures have been proposed for these relations under a variety of equational theories. However, each theory has its particular algorithm, and none has been implemented so far. We provide a generic procedure for deducibility and static equivalence that takes as input any convergent rewrite system. We show that our algorithm covers most of the existing decision procedures for convergent theories. We also provide an efficient implementation, and compare it briefly with the tools ProVerif and KiSs.
BibTeX
@article{BCD-tocl12, author = {Baudet, Mathieu and Cortier, V{\'e}ronique and Delaune, St{\'e}phanie}, journal = {ACM Transactions on Computational Logic}, publisher = {ACM Press}, volume = {14}, issue = {1}, title = {{YAPA}: A~generic tool for computing intruder knowledge}, year = {2013}, abstract = {Reasoning about the knowledge of an attacker is a necessary step in many formal analyses of security protocols. In the framework of the applied pi calculus, as in similar languages based on equational logics, knowledge is typically expressed by two relations: deducibility and static equivalence. Several decision procedures have been proposed for these relations under a variety of equational theories. However, each theory has its particular algorithm, and none has been implemented so far. We provide a generic procedure for deducibility and static equivalence that takes as input any convergent rewrite system. We show that our algorithm covers most of the existing decision procedures for convergent theories. We also provide an efficient implementation, and compare it briefly with the tools ProVerif and KiSs.}, doi = {10.1145/2422085.2422089}, }