Combining Theory Generation and Model Checking for Security Protocol Analysis,
CARNEGIE-MELLON UNIV PITTSBURGH PA DEPT OF COMPUTER SCIENCE
Pagination or Media Count:
This paper reviews two relatively new tools for automated formal analysis of security protocols. One applies the formal methods technique of model checking to the task of protocol analysis, while the other utilizes the method of theory generation. which borrows from both model checking and automated theorem proving. For purposes of comparison. the tools are both applied to a suite of sampIe protocols with known laws. including the protocol used in an earlier study to provide a baseline. We then suggest a heuristic for combining the two approaches to provide a more complete analysis than either approach can provide alone.
- Computer Systems Management and Standards