POR for Security Protocol Equivalences: Beyond Action-Determinism
Formal methods have proved effective to automatically analyze protocols. Over the past years, much research has focused on verifying trace equivalence on protocols, which is notably used to model many interesting privacy properties, e.g., anonymity or unlinkability. Many tools for checking trace equ...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Formal methods have proved effective to automatically analyze protocols. Over
the past years, much research has focused on verifying trace equivalence on
protocols, which is notably used to model many interesting privacy properties,
e.g., anonymity or unlinkability. Many tools for checking trace equivalence
rely on a naive and expensive exploration of all interleavings of concurrent
actions, which calls for partial-order reduction (POR) techniques. In this
paper, we present the first POR technique for protocol equivalences that does
not rely on an action-determinism assumption: we recast the trace equivalence
problem as a reachability problem, to which persistent and sleep set techniques
can be applied, and we show how to effectively apply these results in the
context of symbolic executions. We report on a prototype implementation,
improving the tool DeepSec. |
---|---|
DOI: | 10.48550/arxiv.1804.03650 |