Location of Repository

Automated Detection of Confidentiality Goals

By Anders Moen Hagalisletto


The security goals of an authentication protocol specify the high level properties of a protocol. Despite the importance of goals, these are rarely specified explicitly. Yet, a qualified analysis of a security protocol requires that the goals are stated explicitly. We propose a novel approach to find confidentiality goals in an automated way, based only on the protocol specification. The benefits of the method are: i Manual specification of goals is replaced by fully automated methods, ii the algorithm constructs the entire protection domain of a protocol, that is, all private and shared secrets, and iii the goal of an attack can be found, explaining which compromised entities are shared between the attacker and the honest principals

Topics: Security protocols, formal specification, automated
Year: 2011
OAI identifier: oai:CiteSeerX.psu:
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • http://citeseerx.ist.psu.edu/v... (external link)
  • http://www.ifi.uio.no/%7Eander... (external link)
  • Suggested articles

    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.