We illustrate ALSP(Action Language for Security Protocol), a declarative executable specification language for planning attacks to security protocols. ALSPis based on logic programming with negation as failure, and with stable model semantics. In ALSPwe can give a declarative specification of a protocol with the natural semantics of send and receive actions which can be performed in parallel. By viewing a protocol trace as a plan to achieve a goal, attacks are (possibly parallel) plans achieving goals that correspond to security violations. Building on results from logic programming and planning, we map the existence of an attack into the existence of a model for the protocol that satisfies the specification of an attack. We show that our liberal model of parallel actions can adequately represent the traditional Dolev-Yao trace-based model used in the formal analysis of security protocols. Specifications in ALSPare executable, as we can automatically search for attacks via an efficient...

Verifying security protocols as planning in logic programming

Massacci, Fabio
2001-01-01

Abstract

We illustrate ALSP(Action Language for Security Protocol), a declarative executable specification language for planning attacks to security protocols. ALSPis based on logic programming with negation as failure, and with stable model semantics. In ALSPwe can give a declarative specification of a protocol with the natural semantics of send and receive actions which can be performed in parallel. By viewing a protocol trace as a plan to achieve a goal, attacks are (possibly parallel) plans achieving goals that correspond to security violations. Building on results from logic programming and planning, we map the existence of an attack into the existence of a model for the protocol that satisfies the specification of an attack. We show that our liberal model of parallel actions can adequately represent the traditional Dolev-Yao trace-based model used in the formal analysis of security protocols. Specifications in ALSPare executable, as we can automatically search for attacks via an efficient...
2001
4
L., Carlucci Aiello; Massacci, Fabio
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11572/73908
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 51
  • ???jsp.display-item.citation.isi??? ND
  • OpenAlex ND
social impact