A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit <a rel="external noopener" href="http://publish.illinois.edu/science-of-security-lablet/files/2014/06/6_Escobar.pdf">the original URL</a>. The file type is <code>application/pdf</code>.
<i title="ACM Press">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ut4j4aw3ifdxffmhjrkfgovbsq" style="color: black;">Proceedings of the 2014 Symposium and Bootcamp on the Science of Security - HotSoS '14</a>
The Maude-NRL Protocol Analyzer (Maude-NPA) is a tool for reasoning about the security of cryptographic protocols in which the cryptosystems satisfy different equational properties. It tries to find secrecy or authentication attacks by searching backwards from an insecure attack state pattern that may contain logical variables, in such a way that logical variables become properly instantiated in order to find an initial state. The execution mechanism for this logical reachability is narrowing<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2600176.2600186">doi:10.1145/2600176.2600186</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/hotsos/EscobarMMS14.html">dblp:conf/hotsos/EscobarMMS14</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/twpkbjqwrvc3tbpgichv2iirra">fatcat:twpkbjqwrvc3tbpgichv2iirra</a> </span>
more »... dulo an equational theory. Although Maude-NPA also possesses a forwards semantics naturally derivable from the backwards semantics, it is not suitable for state space exploration or protocol simulation. In this paper we define an executable forwards semantics for Maude-NPA, instead of its usual backwards one, and restrict it to the case of concrete states, that is, to terms without logical variables. This case corresponds to standard rewriting modulo an equational theory. We prove soundness and completeness of the backwards narrowing-based semantics with respect to the rewriting-based forwards semantics. We show its effectiveness as an analysis method that complements the backwards analysis with new prototyping, simulation, and explicit-state model checking features by providing some experimental results.
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170808125431/http://publish.illinois.edu/science-of-security-lablet/files/2014/06/6_Escobar.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/af/2b/af2bb51a5e14b2dd067102184ee36ce6b74ca0d8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2600176.2600186"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>