POR for Security Protocol Equivalences: Beyond Action-Determinism

Formal methods have proved effective to automatically analyze protocols. Over the past years, much research has focused on verifying trace equivalence on protocols, which is notably used to model many interesting privacy properties, e.g., anonymity or unlinkability. Many tools for checking trace equ...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Baelde, David, Delaune, Stéphanie, Hirschi, Lucca
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Baelde, David
Delaune, Stéphanie
Hirschi, Lucca
description Formal methods have proved effective to automatically analyze protocols. Over the past years, much research has focused on verifying trace equivalence on protocols, which is notably used to model many interesting privacy properties, e.g., anonymity or unlinkability. Many tools for checking trace equivalence rely on a naive and expensive exploration of all interleavings of concurrent actions, which calls for partial-order reduction (POR) techniques. In this paper, we present the first POR technique for protocol equivalences that does not rely on an action-determinism assumption: we recast the trace equivalence problem as a reachability problem, to which persistent and sleep set techniques can be applied, and we show how to effectively apply these results in the context of symbolic executions. We report on a prototype implementation, improving the tool DeepSec.
doi_str_mv 10.48550/arxiv.1804.03650
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_1804_03650</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1804_03650</sourcerecordid><originalsourceid>FETCH-LOGICAL-a670-baa5371810836d75cd7b6c42c20c059ce0accb5052053132786121eec807616d3</originalsourceid><addsrcrecordid>eNotz71OwzAUQGEvHVDhAZjwCyRc2_FP2UIpBalSK9o9cm5uJUtJXJy0Im-PWpjOdqSPsUcBeeG0hmeffsIlFw6KHJTRcMfK3faLH2Pie8JzCuPEdymOEWPLV9_ncPEt9UjDC3-lKfYNL3EMsc_eaKTUhT4M3T2bHX070MN_5-zwvjosP7LNdv25LDeZNxay2nutrHACnDKN1djY2mAhUQKCXiCBR6w1aAlaCSWtM0IKInRgjTCNmrOnv-3NUJ1S6HyaqqululnULwd6Qwo</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>POR for Security Protocol Equivalences: Beyond Action-Determinism</title><source>arXiv.org</source><creator>Baelde, David ; Delaune, Stéphanie ; Hirschi, Lucca</creator><creatorcontrib>Baelde, David ; Delaune, Stéphanie ; Hirschi, Lucca</creatorcontrib><description>Formal methods have proved effective to automatically analyze protocols. Over the past years, much research has focused on verifying trace equivalence on protocols, which is notably used to model many interesting privacy properties, e.g., anonymity or unlinkability. Many tools for checking trace equivalence rely on a naive and expensive exploration of all interleavings of concurrent actions, which calls for partial-order reduction (POR) techniques. In this paper, we present the first POR technique for protocol equivalences that does not rely on an action-determinism assumption: we recast the trace equivalence problem as a reachability problem, to which persistent and sleep set techniques can be applied, and we show how to effectively apply these results in the context of symbolic executions. We report on a prototype implementation, improving the tool DeepSec.</description><identifier>DOI: 10.48550/arxiv.1804.03650</identifier><language>eng</language><subject>Computer Science - Cryptography and Security</subject><creationdate>2018-04</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,776,881</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/1804.03650$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.1804.03650$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Baelde, David</creatorcontrib><creatorcontrib>Delaune, Stéphanie</creatorcontrib><creatorcontrib>Hirschi, Lucca</creatorcontrib><title>POR for Security Protocol Equivalences: Beyond Action-Determinism</title><description>Formal methods have proved effective to automatically analyze protocols. Over the past years, much research has focused on verifying trace equivalence on protocols, which is notably used to model many interesting privacy properties, e.g., anonymity or unlinkability. Many tools for checking trace equivalence rely on a naive and expensive exploration of all interleavings of concurrent actions, which calls for partial-order reduction (POR) techniques. In this paper, we present the first POR technique for protocol equivalences that does not rely on an action-determinism assumption: we recast the trace equivalence problem as a reachability problem, to which persistent and sleep set techniques can be applied, and we show how to effectively apply these results in the context of symbolic executions. We report on a prototype implementation, improving the tool DeepSec.</description><subject>Computer Science - Cryptography and Security</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotz71OwzAUQGEvHVDhAZjwCyRc2_FP2UIpBalSK9o9cm5uJUtJXJy0Im-PWpjOdqSPsUcBeeG0hmeffsIlFw6KHJTRcMfK3faLH2Pie8JzCuPEdymOEWPLV9_ncPEt9UjDC3-lKfYNL3EMsc_eaKTUhT4M3T2bHX070MN_5-zwvjosP7LNdv25LDeZNxay2nutrHACnDKN1djY2mAhUQKCXiCBR6w1aAlaCSWtM0IKInRgjTCNmrOnv-3NUJ1S6HyaqqululnULwd6Qwo</recordid><startdate>20180410</startdate><enddate>20180410</enddate><creator>Baelde, David</creator><creator>Delaune, Stéphanie</creator><creator>Hirschi, Lucca</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20180410</creationdate><title>POR for Security Protocol Equivalences: Beyond Action-Determinism</title><author>Baelde, David ; Delaune, Stéphanie ; Hirschi, Lucca</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a670-baa5371810836d75cd7b6c42c20c059ce0accb5052053132786121eec807616d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Computer Science - Cryptography and Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Baelde, David</creatorcontrib><creatorcontrib>Delaune, Stéphanie</creatorcontrib><creatorcontrib>Hirschi, Lucca</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Baelde, David</au><au>Delaune, Stéphanie</au><au>Hirschi, Lucca</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>POR for Security Protocol Equivalences: Beyond Action-Determinism</atitle><date>2018-04-10</date><risdate>2018</risdate><abstract>Formal methods have proved effective to automatically analyze protocols. Over the past years, much research has focused on verifying trace equivalence on protocols, which is notably used to model many interesting privacy properties, e.g., anonymity or unlinkability. Many tools for checking trace equivalence rely on a naive and expensive exploration of all interleavings of concurrent actions, which calls for partial-order reduction (POR) techniques. In this paper, we present the first POR technique for protocol equivalences that does not rely on an action-determinism assumption: we recast the trace equivalence problem as a reachability problem, to which persistent and sleep set techniques can be applied, and we show how to effectively apply these results in the context of symbolic executions. We report on a prototype implementation, improving the tool DeepSec.</abstract><doi>10.48550/arxiv.1804.03650</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.1804.03650
ispartof
issn
language eng
recordid cdi_arxiv_primary_1804_03650
source arXiv.org
subjects Computer Science - Cryptography and Security
title POR for Security Protocol Equivalences: Beyond Action-Determinism
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-04T01%3A53%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=POR%20for%20Security%20Protocol%20Equivalences:%20Beyond%20Action-Determinism&rft.au=Baelde,%20David&rft.date=2018-04-10&rft_id=info:doi/10.48550/arxiv.1804.03650&rft_dat=%3Carxiv_GOX%3E1804_03650%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true