We present a technique for automatically verifying cryptographic protocols specified in the mainstream specification language CAPSL. Our work is based on model checking multi-agent systems against properties given in AI logics. We present PC2IS, a compiler from CAPSL to ISPL, the input language of MCMAS, a symbolic model checker for MAS. The technique also reduces automatically the state space to be considered by the model checker, thereby maximising the number of protocols and sessions that can be verified. We evaluate the technique on protocols in the Clark-Jacobs library against custom secrecy and authentication requirements as well as against more advanced properties that are expressible in this epistemic-based approach
While temporal logic in its various forms has proven essential to reason about reactive systems, age...
We present a methodology for the automated verification of quantum protocols using MCMAS, a symbolic...
Epistemic protocols are communication pro-tocols aiming at transfer of knowledge in a controlled way...
We present a technique for automatically verifying cryptographic protocols specified in the mainstre...
Security protocols specify the communication required to achieve security objectives, e.g., data-pri...
Knowledge-based programs provide an abstract level of description of protocols in which agent action...
Security protocols specify the communication required to achieve security objectives, e.g., data-pri...
Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the...
Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the...
Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the...
Abstract. Security properties naturally combine temporal aspects of protocols with aspects of knowle...
Security protocols specify the communication required to achieve security objectives, e.g., data-pri...
Security protocols specify the communication required to achieve security objectives, e.g., data-pr...
While temporal logic in its various forms has proven essential to reason about reactive systems, age...
AbstractWe present a compiler that translates a multi-agent systems specification given in the forma...
While temporal logic in its various forms has proven essential to reason about reactive systems, age...
We present a methodology for the automated verification of quantum protocols using MCMAS, a symbolic...
Epistemic protocols are communication pro-tocols aiming at transfer of knowledge in a controlled way...
We present a technique for automatically verifying cryptographic protocols specified in the mainstre...
Security protocols specify the communication required to achieve security objectives, e.g., data-pri...
Knowledge-based programs provide an abstract level of description of protocols in which agent action...
Security protocols specify the communication required to achieve security objectives, e.g., data-pri...
Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the...
Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the...
Security properties naturally combine temporal aspects of protocols with aspects of knowledge of the...
Abstract. Security properties naturally combine temporal aspects of protocols with aspects of knowle...
Security protocols specify the communication required to achieve security objectives, e.g., data-pri...
Security protocols specify the communication required to achieve security objectives, e.g., data-pr...
While temporal logic in its various forms has proven essential to reason about reactive systems, age...
AbstractWe present a compiler that translates a multi-agent systems specification given in the forma...
While temporal logic in its various forms has proven essential to reason about reactive systems, age...
We present a methodology for the automated verification of quantum protocols using MCMAS, a symbolic...
Epistemic protocols are communication pro-tocols aiming at transfer of knowledge in a controlled way...