Security Investigate

An Intruder Model With Message Inspection for Model Checking Security Protocols

Download now Free registration required

Executive Summary

Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack actions against the ongoing protocol session(s). Any attempt to enumerate all messages that can be deduced by the intruder and the possible actions in all protocol steps results in an enormous branching of the model's state space. In this paper, the authors introduce a new intruder model that can be exploited for state space reduction, optionally in combination with known techniques, such as partial order and symmetry reduction.

  • Format: PDF
  • Size: 741.53 KB