Decidable Inductive Invariants for Verification of Cryptographic Protocols with Unbounded Sessions

CONCUR(2020)

引用 3|浏览5
暂无评分
摘要
We develop a theory of decidable inductive invariants for an infinite-state variant of the Applied pi-calculus, with applications to automatic verification of stateful cryptographic protocols with unbounded sessions/nonces. Since in the presence of unbounded sessions any trace property becomes undecidable, we focus on (i) depth-bounded protocols, a generalisation of a class of infinite-state protocols proposed by D'Osualdo, Ong and Tiu; and (ii) downward-closed properties, which include many security properties such as absence of leaks of secrets. We study the structure of depth-bounded protocols within the framework of ideal completions for well-structured transition systems. Our main contribution is a class of expressions, called limits, that are shown sound and complete for representing infinite downward-closed sets of configurations of depth-bounded protocols. We provide direct algorithms to prove that a given limit is an inductive invariant for a protocol. Inductive invariants of this form can be inferred, and represent an independently checkable certificate of correctness. To evaluate whether the approach is viable, we provide a prototype implementation and we report on its performance on some illustrative examples.
更多
查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要