A Comparison and Combination of Theory Generation and Model Checking
for Security Protocol Analysis
Author: Nicholas J. Hopper and Sanjit A. Seshia and Jeannette M. Wing
Click here for the
PostScript
version.
Abstract
This paper reviews two relatively new tools for automated formal
analyis of security protocols. One applies the formal methods
technique of model checking to the task of protocol analysis, while
the other utilizes the method of theory generation, which borrows from both
model checking and automated theorem
proving. For purposes of comparison, the tools are both applied to a
suite of sample protocols with known flaws, including the protocol used
in an earlier study \cite{KMM} to provide a baseline. We then suggest
a heuristic for combining the two approaches to provide a more
complete analysis than either approach can provide alone.