About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Journal article

Constraint Differentiation: Search-Space Reduction for the Constraint-Based Analysis of Security Protocols

Edited by Goto, Atsuhiro

From

Language-Based Technology, Department of Informatics and Mathematical Modeling, Technical University of Denmark1

Department of Informatics and Mathematical Modeling, Technical University of Denmark2

Swiss Federal Institute of Technology Zurich3

University of Verona4

We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation works by eliminating certain kinds of redundancies that arise in the search space when using constraints to represent and manipulate the messages that may be sent by an active intruder.

We define constraint differentiation in a general way, independent of the technical and conceptual details of the underlying constraint-based method and protocol model. Formally, we prove that constraint differentiation terminates and is correct, under the assumption that the original constraint-based approach has these properties.

Practically, as a concrete case study, we have integrated this technique into OFMC, a state-of-the-art model-checker for security protocol analysis, and demonstrated its effectiveness by extensive experimentation. Our results show that constraint differentiation substantially reduces search and considerably improves the performance of OFMC, enabling its application to a wider class of problems.

Language: English
Publisher: IOS Press
Year: 2010
Pages: 575-618
ISSN: 18758924 and 0926227x
Types: Journal article
DOI: 10.3233/JCS-2009-0351
ORCIDs: Mödersheim, Sebastian Alexander

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis