Decidable Inductive Invariants for Verification of Cryptographic Protocols with Unbounded Sessions

11/13/2019
by   Emanuele D'Osualdo, et al.
0

We develop a theory of decidable inductive invariants for an infinite-state variant of the Applied pi-calculus, with applications to automatic verification of stateful cryptographic protocols with unbounded sessions/nonces. Since in the presence of unbounded sessions any trace property becomes undecidable, we focus on (i) depth-bounded protocols, a generalisation of a class of infinite-state protocols proposed by D'Osualdo, Ong and Tiu; and (ii) downward-closed properties, which include many security properties such as absence of leaks of secrets. We study the structure of depth-bounded protocols within the framework of ideal completions for well-structured transition systems. Our main contribution is a class of expressions, called limits, that are shown sound and complete for representing infinite downward-closed sets of configurations of depth-bounded protocols. We provide direct algorithms to prove that a given limit is an inductive invariant for a protocol. Inductive invariants of this form can be inferred, and represent an independently checkable certificate of correctness. To evaluate whether the approach is viable, we provide a prototype implementation and we report on its performance on some illustrative examples.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/19/2019

Inferring Inductive Invariants from Phase Structures

Infinite-state systems such as distributed protocols are challenging to ...
research
10/24/2017

Bounded Quantifier Instantiation for Checking Inductive Invariants

We consider the problem of checking whether a proposed invariant ϕ expre...
research
11/28/2022

Automating and Mechanizing Cutoff-based Verification of Distributed Protocols

Distributed protocols are generally parametric and can be executed on a ...
research
05/13/2021

The Inductive Approach to Verifying Cryptographic Protocols

Informal arguments that cryptographic protocols are secure can be made r...
research
08/28/2017

A Type System for Privacy Properties (Technical Report)

Mature push button tools have emerged for checking trace properties (e.g...
research
03/27/2021

On Symmetry and Quantification: A New Approach to Verify Distributed Protocols

Proving that an unbounded distributed protocol satisfies a given safety ...
research
06/22/2020

Verifying Accountability for Unbounded Sets of Participants

Little can be achieved in the design of security protocols without trust...

Please sign up or login with your details

Forgot password? Click here to reset