YAPA

YAPA: A generic tool for computing intruder knowledge. Reasoning about the knowledge of an attacker is a necessary step in many formal analyses of security protocols. In the framework of the applied pi-calculus, as in similar languages based on equational logics, knowledge is typically expressed by two relations: deducibility and static equivalence. Several decision procedures have been proposed for these relations under a variety of equational theories. However, each theory has its particular algorithm, and none has been implemented so far. We provide a generic procedure for deducibility and static equivalence that takes as input any convergent rewrite system. We show that our algorithm covers all the existing decision procedures for convergent theories. We also provide an efficient implementation, and compare it briefly with the more general tool ProVerif.


References in zbMATH (referenced in 11 articles , 2 standard articles )

Showing results 1 to 11 of 11.
Sorted by year (citations)

  1. Baudet, Mathieu; Cortier, Véronique; Delaune, Stéphanie: YAPA: a generic tool for computing intruder knowledge (2013)
  2. Chadha, Rohit; Ciob^acă, Ştefan; Kremer, Steve: Automated verification of equivalence properties of cryptographic protocols (2012)
  3. Ciob^acă, Ştefan; Delaune, Stéphanie; Kremer, Steve: Computing knowledge in security protocols under convergent equational theories (2012)
  4. Kremer, Steve; Mercier, Antoine; Treinen, Ralf: Reducing equational theories for the decision of static equivalence (2012)
  5. Berrima, Mouhebeddine; Ben Rajeb, Narjes; Cortier, Véronique: Deciding knowledge in security protocols under some e-voting theories (2011)
  6. Conchinha, Bruno; Basin, David A.; Caleiro, Carlos: FAST: an efficient decision procedure for deduction and static equivalence (2011)
  7. Baudet, Mathieu; Cortier, Véronique; Delaune, Stéphanie: YAPA: A generic tool for computing intruder knowledge (2010)
  8. Chevalier, Yannick; Rusinowitch, Michaël: Compiling and securing cryptographic protocols (2010)
  9. Cheval, Vincent; Comon-Lundh, Hubert; Delaune, Stéphanie: Automating security analysis: symbolic equivalence of constraint systems (2010)
  10. Baudet, Mathieu; Cortier, Véronique; Delaune, Stéphanie: YAPA: a generic tool for computing intruder knowledge (2009)
  11. Escobar, Santiago; Meadows, Catherine; Meseguer, José: Maude-NPA: cryptographic protocol analysis modulo equational properties (2009)