We study an automatic technique for the verification of cryptographic protocols based on a Horn clause model of the protocol. This technique yields proofs valid for an unbounded number of sessions of the protocol. However, up to now, it gave no definite information when the proof failed. In this paper, we present an algorithm for reconstructing an attack against the protocol when the desired security property does not hold. We have proved soundness, termination, as well as a partial completeness result for our algorithm. We have also implemented it in the automatic protocol verifier ProVerif. As an extreme example, we could reconstruct an attack involving 200 parallel sessions against the f$^{200}$g$^{200}$ protocol
Article dans revue scientifique avec comité de lecture. internationale.International audienceWe pres...
AbstractWe present CASRUL, a compiler for cryptographic protocols specifications. Its purpose is to ...
ProVerif over-approximates the attacker’s power to enable verification of processes under replicatio...
We study an automatic technique for the verification of cryptographic protocols based on a Horn clau...
We study an automatic technique for the verification of cryptographic protocols based on a Horn clau...
International audienceThis chapter presents a method for verifying security protocols based on an ab...
International audienceThis chapter presents a method for verifying security protocols based on an ab...
Abstract. This chapter presents a method for verifying security protocols based on an abstract repre...
We present a technique for cryptographic protocol verification, based on an intermediate representat...
We present a technique for cryptographic protocol verification, based on an intermediate representat...
Colloque avec actes et comité de lecture. internationale.International audienceWe present a new mode...
Colloque avec actes et comité de lecture. internationale.International audienceWe present a new mode...
International audienceWe present a novel automatic technique for proving secrecy and authentication ...
We present a technique for cryptographic protocol verification, based on an intermediate representat...
Article dans revue scientifique avec comité de lecture. internationale.International audienceWe pres...
Article dans revue scientifique avec comité de lecture. internationale.International audienceWe pres...
AbstractWe present CASRUL, a compiler for cryptographic protocols specifications. Its purpose is to ...
ProVerif over-approximates the attacker’s power to enable verification of processes under replicatio...
We study an automatic technique for the verification of cryptographic protocols based on a Horn clau...
We study an automatic technique for the verification of cryptographic protocols based on a Horn clau...
International audienceThis chapter presents a method for verifying security protocols based on an ab...
International audienceThis chapter presents a method for verifying security protocols based on an ab...
Abstract. This chapter presents a method for verifying security protocols based on an abstract repre...
We present a technique for cryptographic protocol verification, based on an intermediate representat...
We present a technique for cryptographic protocol verification, based on an intermediate representat...
Colloque avec actes et comité de lecture. internationale.International audienceWe present a new mode...
Colloque avec actes et comité de lecture. internationale.International audienceWe present a new mode...
International audienceWe present a novel automatic technique for proving secrecy and authentication ...
We present a technique for cryptographic protocol verification, based on an intermediate representat...
Article dans revue scientifique avec comité de lecture. internationale.International audienceWe pres...
Article dans revue scientifique avec comité de lecture. internationale.International audienceWe pres...
AbstractWe present CASRUL, a compiler for cryptographic protocols specifications. Its purpose is to ...
ProVerif over-approximates the attacker’s power to enable verification of processes under replicatio...