NRL

The NRL protocol analyzer: An overview. The NRL protocol analyzer is a prototype special-purpose verification tool, written in Prolog, that has been developed for the analysis of cryptographic protocols that are used to authenticate principals and services and distribute keys in a network. In this paper we give an overview of how the analyzer works and describe its achievements so far. We also show how our use of the Prolog language benefited us in the design and implementation of the analyzer.


References in zbMATH (referenced in 23 articles , 1 standard article )

Showing results 1 to 20 of 23.
Sorted by year (citations)

1 2 next

  1. Arapinis, Myrto; Duflot, Marie: Bounding messages for free in security protocols -- extension to various security properties (2014)
  2. Bella, Giampaolo: Inductive study of confidentiality: for everyone (2014) ioport
  3. Escobar, Santiago; Meadows, Catherine; Meseguer, José; Santiago, Sonia: State space reduction in the Maude-NRL protocol analyzer (2014)
  4. Meseguer, José: Twenty years of rewriting logic (2012)
  5. Basin, David; Caleiro, Carlos; Ramos, Jaime; Viganò, Luca: Distributed temporal logic for the analysis of security protocol models (2011)
  6. Chevalier, Yannick; Rusinowitch, Michael: Symbolic protocol analysis in the union of disjoint intruder theories: combining decision procedures (2010)
  7. Cervesato, Iliano; Scedrov, Andre: Relating state-based and process-based concurrency through linear logic (full-version) (2009)
  8. Chevalier, Yannick; Rusinowitch, Michael: Hierarchical combination of intruder theories (2008)
  9. Udrea, Octavian; Lumezanu, Cristian; Foster, Jeffrey S.: Rule-based static analysis of network protocol implementations (2008)
  10. Cervesato, Iliano; Stehr, Mark-Oliver: Representing the MSR cryptoprotocol specification language in an extension of rewriting logic with dependent types (2007)
  11. Meseguer, José; Thati, Prasanna: Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols (2007)
  12. Escobar, Santiago; Meadows, Catherine; Meseguer, José: A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties (2006)
  13. Thati, Prasanna; Meseguer, José: Complete symbolic reachability analysis using back-and-forth narrowing (2006)
  14. Basin, David; Mödersheim, Sebastian; Viganò, Luca: OFMC: a symbolic model checker for security protocols (2005) ioport
  15. Bozzano, Marco; Delzanno, Giorgio: Automatic verification of secrecy properties for linear logic specifications of cryptographic protocols (2005)
  16. Chen, Qingfeng; Zhang, Chengqi; Zhang, Shichao: ENDL: A logical framework for verifying secure transaction protocols (2005) ioport
  17. Yang, Ping; Ramakrishnan, C.R.; Smolka, Scott A.: A logical encoding of the $\pi$-calculus: model checking mobile processes using tabled resolution (2004) ioport
  18. Adi, Kamel; Debbabi, Mourad; Me Jri, Mohamed: A new logic for electronic commerce protocols (2003)
  19. Aiello, Luigia Carlucci; Massacci, Fabio: Attacking fair-exchange protocols: parallel models vs. trace models (2003)
  20. Shmatikov, Vitaly; Mitchell, John C.: Finite-state analysis of two contract signing protocols (2002)

1 2 next