License: Creative Commons Attribution 3.0 Unported license (CC BY 3.0)
When quoting this document, please refer to the following
DOI: 10.4230/LIPIcs.CONCUR.2020.31
URN: urn:nbn:de:0030-drops-128433
URL: http://dagstuhl.sunsite.rwth-aachen.de/volltexte/2020/12843/
D'Osualdo, Emanuele ;
Stutz, Felix
Decidable Inductive Invariants for Verification of Cryptographic Protocols with Unbounded Sessions
Abstract
We develop a theory of decidable inductive invariants for an infinite-state variant of the Applied πcalc, with applications to automatic verification of stateful cryptographic protocols with unbounded sessions/nonces. Since the problem is undecidable in general, we introduce depth-bounded protocols, a strict generalisation of a class from the literature, for which our decidable analysis is sound and complete. Our core contribution is a procedure to check that an invariant is inductive, which implies that every reachable configuration satisfies it. Our invariants can capture security properties like secrecy, can be inferred automatically, and represent an independently checkable certificate of correctness. We provide a prototype implementation and we report on its performance on some textbook examples.
BibTeX - Entry
@InProceedings{dosualdo_et_al:LIPIcs:2020:12843,
author = {Emanuele D'Osualdo and Felix Stutz},
title = {{Decidable Inductive Invariants for Verification of Cryptographic Protocols with Unbounded Sessions}},
booktitle = {31st International Conference on Concurrency Theory (CONCUR 2020)},
pages = {31:1--31:23},
series = {Leibniz International Proceedings in Informatics (LIPIcs)},
ISBN = {978-3-95977-160-3},
ISSN = {1868-8969},
year = {2020},
volume = {171},
editor = {Igor Konnov and Laura Kov{\'a}cs},
publisher = {Schloss Dagstuhl--Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/opus/volltexte/2020/12843},
URN = {urn:nbn:de:0030-drops-128433},
doi = {10.4230/LIPIcs.CONCUR.2020.31},
annote = {Keywords: Security Protocols, Infinite-State Verification, Ideal Completions for WSTS}
}
Keywords: |
|
Security Protocols, Infinite-State Verification, Ideal Completions for WSTS |
Collection: |
|
31st International Conference on Concurrency Theory (CONCUR 2020) |
Issue Date: |
|
2020 |
Date of publication: |
|
26.08.2020 |
Supplementary Material: |
|
Tool available at https://doi.org/10.5281/zenodo.3950846 |