A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
A tool for lazy verification of security protocols
Proceedings 16th Annual International Conference on Automated Software Engineering (ASE 2001)
We present the lazy strategy implemented in a compiler of cryptographic protocols, Casrul. The purpose of this compiler is to verify protocols and to translate them into rewrite rules that can be used by several kinds of automatic or semi-automatic tools for finding flaws, or proving properties. It is entirely automatic, and the efficiency of the generated rules is guaranteed because of the use of a lazy model of an Intruder behavior. This efficiency is illustrated on several examples.
doi:10.1109/ase.2001.989832
dblp:conf/kbse/ChevalierV01
fatcat:coggegm5hjhbbitzkvzvyeqrsy