{"title":"An environment for specifying and verifying security properties","authors":"Andre Renaud, P. Krishnan","doi":"10.1109/ASWEC.2001.948514","DOIUrl":null,"url":null,"abstract":"In this article we present an environment in which a variety of protocols can be analysed. The input accepted by the tool is a description of the protocol in a language similar to CAPSL. We extend CAPSL with a generalised form of control (e.g., parallelism and choice), explicit support for mutable state and expressing a variety of dependencies. The language also supports the specification of the security analyses that need to be performed. To effect the security analysis we translate the protocol into a suitable input for the theorem prover PVS. The proofs are then carried out in PVS. The tool automatically generates the lemmas required to prove the key theorems. These lemmas essentially describe simple, but key, properties of the possible messages. The tool also generates strategies to prove the lemmas and the main theorems.","PeriodicalId":360336,"journal":{"name":"Proceedings 2001 Australian Software Engineering Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2001-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 2001 Australian Software Engineering Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ASWEC.2001.948514","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
In this article we present an environment in which a variety of protocols can be analysed. The input accepted by the tool is a description of the protocol in a language similar to CAPSL. We extend CAPSL with a generalised form of control (e.g., parallelism and choice), explicit support for mutable state and expressing a variety of dependencies. The language also supports the specification of the security analyses that need to be performed. To effect the security analysis we translate the protocol into a suitable input for the theorem prover PVS. The proofs are then carried out in PVS. The tool automatically generates the lemmas required to prove the key theorems. These lemmas essentially describe simple, but key, properties of the possible messages. The tool also generates strategies to prove the lemmas and the main theorems.