An experiment in ping-pong protocol verification by nondeterministic pushdown automata

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Documents

An experiment is described that confirms the security of a well-studied class of cryptographic protocols(Dolev-Yao intruder model) can be verified by two-way nondeterministic pushdown automata(2NPDA). A nondeterministic pushdown program checks whether the intersection of a regular language(the protocol to verify) and a given Dyck language containing all canceling words is empty. Ifit is not, an intruder can reveal secret messages sent between trusted users. The verification is guaranteedto terminate in cubic time at most on a 2NPDA-simulator. The interpretive approach used in thisexperiment simplifies the verification, by separating the nondeterministic pushdown logic and programcontrol, and makes it more predictable. We describe the interpretive approach and the knowntransformational solutions, and show they share interesting features. Also noteworthy is how abstractresults from automata theory can solve practical problems by programming language means.
Original languageEnglish
Title of host publicationProceedings Third Workshop on Models for Formal Analysis of Real Systems and Sixth International Workshop on Verification and Program Transformation. Proceedings
EditorsJohn P. Gallagher, Rob van Glabbeek, Wendelin Serwe
PublisherOpen Publishing Association
Publication date2018
Pages169-184
DOIs
Publication statusPublished - 2018
Event6th International Workshop on Verification and Program Transformation - Thessaloniki, Greece
Duration: 20 Apr 2018 → …

Workshop

Workshop6th International Workshop on Verification and Program Transformation
LandGreece
ByThessaloniki
Periode20/04/2018 → …
SeriesElectronic Proceedings in Theoretical Computer Science
Volume268
ISSN2075-2180

Number of downloads are based on statistics from Google Scholar and www.ku.dk


No data available

ID: 194063040