Towards the Attacker's View of Protocol Narrations (or, How to Compile Security Protocols)
As protocol narrations are widely used to describe security protocols, e orts have been made to formalize or devise semantics for them. An important, but largely neglected, question is whether or not the formalism faithfully accounts for the attacker's view. Several attempts have been made in the literature to recover the attacker's view. They, however, are rather restricted in scope and quite complex. This greatly impedes the ability of protocol verification tools to detect intricate attacks. In this paper, the authors establish a faithful view of the attacker based on rigorous, yet intuitive, interpretations of exchanged messages. This gives them a new way to look at attacks and protocol implementations.