A logic for constraint-based security protocol analysis

Ricardo Corin, Ari Saptawijaya, Sandro Etalle

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

32 Citations (Scopus)

Abstract

We propose PS-LTL, a pure-past security linear temporal logic that allows the specification of a variety of authentication, secrecy and data freshness properties. Furthermore, we present a sound and complete decision procedure to establish the validity of security properties for symbolic execution traces, and show the integration with constraint-based analysis techniques.

Original languageEnglish
Title of host publicationProceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006
Pages155-168
Number of pages14
DOIs
Publication statusPublished - 2006
Event2006 IEEE Symposium on Security and Privacy, S and P 2006 - Berkeley, United States
Duration: 21 May 200624 May 2006

Publication series

NameProceedings - IEEE Symposium on Security and Privacy
Volume2006
ISSN (Print)1081-6011

Conference

Conference2006 IEEE Symposium on Security and Privacy, S and P 2006
Country/TerritoryUnited States
CityBerkeley
Period21/05/0624/05/06

Fingerprint

Dive into the research topics of 'A logic for constraint-based security protocol analysis'. Together they form a unique fingerprint.

Cite this