The NRL protocol analyzer: An overview. The NRL protocol analyzer is a prototype special-purpose verification tool, written in Prolog, that has been developed for the analysis of cryptographic protocols that are used to authenticate principals and services and distribute keys in a network. In this paper we give an overview of how the analyzer works and describe its achievements so far. We also show how our use of the Prolog language benefited us in the design and implementation of the analyzer.

References in zbMATH (referenced in 34 articles , 1 standard article )

Showing results 1 to 20 of 34.
Sorted by year (citations)

1 2 next

  1. Basin, David; Cremers, Cas; Meadows, Catherine: Model checking security protocols (2018)
  2. Arapinis, Myrto; Duflot, Marie: Bounding messages for free in security protocols -- extension to various security properties (2014)
  3. Bella, Giampaolo: Inductive study of confidentiality: for everyone (2014) ioport
  4. Blanchet, Bruno: Automatic verification of security protocols in the symbolic model: the verifier ProVerif (2014)
  5. Escobar, Santiago; Meadows, Catherine; Meseguer, José; Santiago, Sonia: State space reduction in the Maude-NRL protocol analyzer (2014)
  6. Meseguer, José: Twenty years of rewriting logic (2012)
  7. Basin, David; Caleiro, Carlos; Ramos, Jaime; Viganò, Luca: Distributed temporal logic for the analysis of security protocol models (2011)
  8. Chevalier, Yannick; Rusinowitch, Michael: Symbolic protocol analysis in the union of disjoint intruder theories: combining decision procedures (2010)
  9. Cervesato, Iliano; Scedrov, Andre: Relating state-based and process-based concurrency through linear logic (full-version) (2009)
  10. Escobar, Santiago; Meadows, Catherine; Meseguer, José: Maude-NPA: cryptographic protocol analysis modulo equational properties (2009)
  11. Mödersheim, Sebastian; Viganò, Luca: The open-source fixed-point model checker for symbolic analysis of security protocols (2009)
  12. Santiago, S.; Talcott, C.; Escobar, S.; Meadows, C.; Meseguer, J.: A graphical user interface for maude-NPA (2009) ioport
  13. Chevalier, Yannick; Rusinowitch, Michael: Hierarchical combination of intruder theories (2008)
  14. Udrea, Octavian; Lumezanu, Cristian; Foster, Jeffrey S.: Rule-based static analysis of network protocol implementations (2008)
  15. Cervesato, Iliano; Stehr, Mark-Oliver: Representing the MSR cryptoprotocol specification language in an extension of rewriting logic with dependent types (2007)
  16. Datta, Anupam; Derek, Ante; Mitchell, John C.; Roy, Arnab: Protocol composition logic (PCL) (2007)
  17. Dixon, Clare; Gago, Mari-Carmen Fernández; Fisher, Michael; van der Hoek, Wiebe: Temporal logics of knowledge and their applications in security (2007)
  18. Escobar, Santiago; Meseguer, José; Thati, Prasanna: Narrowing and rewriting logic: from foundations to applications (2007)
  19. Meseguer, José; Thati, Prasanna: Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols (2007)
  20. Cervesato, Iliano; Scedrov, Andre: Relating state-based and process-based concurrency through linear logic (2006)

1 2 next