• Aucun résultat trouvé

The past, present and future of protocol checking with CSP and FDR

N/A
N/A
Protected

Academic year: 2021

Partager "The past, present and future of protocol checking with CSP and FDR"

Copied!
2
0
0

Texte intégral

(1)

HAL Id: inria-00091659

https://hal.inria.fr/inria-00091659

Submitted on 6 Sep 2006

HAL

is a multi-disciplinary open access archive for the deposit and dissemination of sci- entific research documents, whether they are pub- lished or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers.

L’archive ouverte pluridisciplinaire

HAL, est

destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.

The past, present and future of protocol checking with CSP and FDR

Bill Roscoe

To cite this version:

Bill Roscoe. The past, present and future of protocol checking with CSP and FDR. Automatic

Verification of Critical Systems, Sep 2006, Nancy/France, pp.5. �inria-00091659�

(2)

AVoCS 2006

The past, present and future of protocol checking with CSP and FDR

Bill Roscoe

1

Oxford University Computing Laboratory Oxford, U.K.

Abstract

The prehistory of AVoCS (that is, the series of workshops that gave birth to it) consisted of once or twice annual workshops sponsored by DERA (originally by Peter Ryan) from about 1995, usually held in Oxford or Royal Holloway. The focus of many of these meetings was the development of the CSP model of cryptographic protocols, following Gavin Lowe’s discovery that they could be modelled successfully on FDR in 1994. That work led directly or indirectly to most of the formal work done on security protocols since, but naturally many of those whose work was triggered by these discoveries have translated or re-created the ideas in their own notations.

In this talk I will show the particular advantages of using a process algebra, and CSP in particular, for modelling cryptoprotocols, and also some of the problems we have had. I will concentrate on the problem of proving protocols in general, rather than specific small implementations. These methods are based on data independence and in particular the insight of Ranko Lazic that it is possible to get strong results about systems that may include conditional checks for equalities, but not inequalities. In particular, reporting recent joint work with Eldar Kleiner and Tilo Buschmann, I will show how previous work on this topic can be simplified (and automated in Casper) in such a way that it produces remarkably quick proofs or refutations.

This work has led to some interesting insights into the relationship between model checking and other methods of protocol analysis based on strand spaces and Horn clauses.

1 Email: Bill.Roscoe@comlab.ox.ac.uk

Abstract of an invited talk given at AVoCS 2006 URL:avocs06.loria.fr

Références

Documents relatifs

Pharmacological activation of PPARb/d by a specific ligand has been shown to regulate expression levels of genes involved in triglyceride hydrolysis and free fatty acid oxidation,

Keywords: Malware, behavioral detection, behavior abstraction, trace, term rewriting, model checking, first order temporal logic, finite state automaton, formal language..

As stated in Theorem 8, the model-checking problem is equivalent to check- ing emptiness of nondeterministic parity automata on infinite trees.. Similarly, the satisfiability problem

There are several modi- fied live vaccines currently on the market for horses, including, but not limited to, vaccines for equine herpes, equine influ- enza, equine encephalitis,

We used TLC , the explicit-state model checker for TLA + , to verify the correctness properties against our different versions of the Pastry model, instantiated to four nodes. After

The creation of the large TIPSTER collection in 1990, followed by the first Text REtrieval Conference (TREC) in 1992 reframed the shared concept to mean not only using the same

[r]

Finally, we discuss in Section VI two possible modifications of the protocol, and formally prove using model checking that each of them eliminates the penultimate authentication