NRL

The NRL protocol analyzer: An overview. The NRL protocol analyzer is a prototype special-purpose verification tool, written in Prolog, that has been developed for the analysis of cryptographic protocols that are used to authenticate principals and services and distribute keys in a network. In this paper we give an overview of how the analyzer works and describe its achievements so far. We also show how our use of the Prolog language benefited us in the design and implementation of the analyzer.


References in zbMATH (referenced in 38 articles , 1 standard article )

Showing results 1 to 20 of 38.
Sorted by year (citations)

1 2 next

  1. Arapinis, Myrto; Duflot, Marie: Bounding messages for free in security protocols -- extension to various security properties (2014)
  2. Bella, Giampaolo: Inductive study of confidentiality: for everyone (2014)
  3. Escobar, Santiago; Meadows, Catherine; Meseguer, José; Santiago, Sonia: State space reduction in the Maude-NRL protocol analyzer (2014)
  4. Meseguer, José: Twenty years of rewriting logic (2012)
  5. Basin, David; Caleiro, Carlos; Ramos, Jaime; Viganò, Luca: Distributed temporal logic for the analysis of security protocol models (2011)
  6. Chevalier, Yannick; Rusinowitch, Michael: Symbolic protocol analysis in the union of disjoint intruder theories: combining decision procedures (2010)
  7. Cervesato, Iliano; Scedrov, Andre: Relating state-based and process-based concurrency through linear logic (full-version) (2009)
  8. Santiago, S.; Talcott, Carolyn L.; Escobar, Santiago; Meadows, Catherine; Meseguer, José: A graphical user interface for maude-NPA (2009)
  9. Chevalier, Yannick; Rusinowitch, Michael: Hierarchical combination of intruder theories (2008)
  10. Udrea, Octavian; Lumezanu, Cristian; Foster, Jeffrey S.: Rule-based static analysis of network protocol implementations (2008)
  11. Cervesato, Iliano; Stehr, Mark-Oliver: Representing the MSR cryptoprotocol specification language in an extension of rewriting logic with dependent types (2007)
  12. Datta, Anupam; Derek, Ante; Mitchell, John C.; Roy, Arnab: Protocol composition logic (PCL). (2007)
  13. Dixon, Clare; Gago, M.Carmen Fernández; Fisher, Michael; Der Hoek, Wiebe Van: Temporal logics of knowledge and their applications in security. (2007)
  14. Escobar, Santiago; Meadows, Catherine; Meseguer, José: Equational cryptographic reasoning in the maude-NRL protocol analyzer. (2007)
  15. Escobar, Santiago; Meseguer, José; Thati, Prasanna: Narrowing and rewriting logic: From foundations to applications. (2007)
  16. Meseguer, José; Thati, Prasanna: Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols (2007)
  17. Adão, Pedro; Mateus, Paulo; Reis, Tiago; Viganò, Luca: Towards a quantitative analysis of security protocols. (2006)
  18. Cervesato, Iliano; Scedrov, Andre: Relating state-based and process-based concurrency through linear logic. (2006)
  19. Escobar, Santiago; Meadows, Catherine; Meseguer, José: A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties (2006)
  20. Thati, Prasanna; Meseguer, José: Complete symbolic reachability analysis using back-and-forth narrowing (2006)

1 2 next