Combining proverif and automated theorem provers for security protocol verification

Di Long Li*, Alwen Tiu

*Corresponding author for this work

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Citations (Scopus)

    Abstract

    Symbolic verification of security protocols typically relies on an attacker model called the Dolev-Yao model, which does not model adequately various algebraic properties of cryptographic operators used in many real-world protocols. In this work we describe an integration of a state-of-the-art protocol verifier ProVerif, with automated first order theorem provers (ATP). The integration allows one to model directly algebraic properties of cryptographic operators as a first-order equational theory and the specified protocol can be exported to a first-order logic specification in the standard TPTP format for ATP. An attack on a protocol corresponds to a refutation using the encoded first order clauses. We implement a tool that analyses this refutation and extracts an attack trace from it, and visualises the deduction steps performed by the attacker. We show that the combination of ProVerif and ATP can find attacks that cannot be found by ProVerif when algebraic properties are taken into account in the protocol verification.

    Original languageEnglish
    Title of host publicationAutomated Deduction – CADE 2019- 27th International Conference on Automated Deduction, Proceedings
    EditorsPascal Fontaine
    PublisherSpringer
    Pages354-365
    Number of pages12
    ISBN (Print)9783030294359
    DOIs
    Publication statusPublished - 2019
    Event27th International Conference on Automated Deduction, CADE 2019 - Natal, Brazil
    Duration: 27 Aug 201930 Aug 2019

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume11716 LNAI
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Conference

    Conference27th International Conference on Automated Deduction, CADE 2019
    Country/TerritoryBrazil
    CityNatal
    Period27/08/1930/08/19

    Fingerprint

    Dive into the research topics of 'Combining proverif and automated theorem provers for security protocol verification'. Together they form a unique fingerprint.

    Cite this