Capturing parallel attacks within the data independence framework

R.J. Broadfoot, A.W. Roscoe
Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15  
We carry forward the work described in our previous papers [3, 14, 12] on the application of data independence to the model checking of cryptographic protocols using CSP [13] and FDR [5]. In particular, we showed how techniques based on data independence [7, 13] could be used to justify, by means of a finite FDR check, systems where agents can perform an unbounded number of protocol runs. Whilst this allows for a more complete analysis, there was one significant incompleteness in the results we
more » ... obtained: While each individual identity could perform an unlimited number of protocol runs sequentially, the degree of parallelism remained bounded (and small to avoid state space explosion). In this paper, we report significant progress towards the solution of this problem, by means anticipated in [3] , namely by "internalising" all or part of each agent identity within the "intruder" process. The internalisation of agents (initially only server roles) was introduced in [14] as a state-space reduction technique (for which it is usually spectacularly successful). It was quickly noticed that this had the beneficial side-effect of making the internalised server arbitrarily parallel, at least in cases where it did not generate any new values of data independent type. We now consider the case where internal agents do introduce fresh values and address the issue of capturing the state of mind of internal agents (for the purposes of analysis).
doi:10.1109/csfw.2002.1021813 dblp:conf/csfw/BroadfootR02 fatcat:mcjss3pqcjc53p53ui6mbzz3za