Heuristic Methods for Security Protocols

Qurat ul Ain Nizamani,Emilio Tuosto
DOI: https://doi.org/10.4204/EPTCS.7.5
2009-10-21
Abstract:Model checking is an automatic verification technique to verify hardware and software systems. However it suffers from state-space explosion problem. In this paper we address this problem in the context of cryptographic protocols by proposing a security property-dependent heuristic. The heuristic weights the state space by exploiting the security formulae; the weights may then be used to explore the state space when searching for attacks.
Cryptography and Security,Logic in Computer Science,Programming Languages
What problem does this paper attempt to address?