![]() |
![]() |
University of Birmingham > Talks@bham > Computer Security Seminars > Set-pi: Set Membership Pi-calculus
Set-pi: Set Membership Pi-calculusAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Gurchetan Grewal. Communication protocols often rely on stateful mechanisms to ensure certain security properties. For example, counters and timestamps can be used to ensure authentication, or the security of communication can depend on whether a particular key is registered to a server or it has been revoked. ProVerif, like other state of the art tools for protocol analysis, achieves good performance by converting a formal protocol specification into a set of Horn clauses, that represent a monotonically growing set of facts that a Dolev-Yao attacker can derive from the system. Since this set of facts is not state-dependent, the category of protocols of our interest cannot be precisely analysed by such tools, as they would report false attacks due to the over-approximation. We present Set-pi, an extension of the Applied Pi-calculus that includes primitives for handling databases of objects, and propose a translation from Set-pi into Horn clauses that employs the set-membership abstraction to capture the non-monotonicity of the state. Furthermore, we give a characterisation of authentication properties in terms of the set properties in the language, and showcase our method with two examples, a simple authentication protocol based on counters, and key registration protocol. This talk is part of the Computer Security Seminars series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsComputer Science Distinguished Seminars Analysis Seminar Type the title of a new list hereOther talksGeometry of alternating projections in metric spaces with bounded curvature Ultrafast, all-optical, and highly efficient imaging of molecular chirality Hodge Theory: Connecting Algebra and Analysis Modelling uncertainty in image analysis. TBC Provably Convergent Plug-and-Play Quasi-Newton Methods for Imaging Inverse Problems |