Compare commits
4 Commits
0407d94abd
...
3212d103b1
Author | SHA1 | Date |
---|---|---|
Achim D. Brucker | 3212d103b1 | |
Achim D. Brucker | be33b1158c | |
Achim D. Brucker | beb6c839ef | |
Achim D. Brucker | 38c374f657 |
|
@ -0,0 +1,60 @@
|
|||
To cite ofmc-isabelle, please use
|
||||
|
||||
Achim D. Brucker and Sebastian A. Mödersheim. Integrating Automated
|
||||
and Interactive Protocol Verification. In Workshop on Formal Aspects
|
||||
in Security and Trust (FAST 2009). Lecture Notes in Computer Science (5983),
|
||||
pages 248-262, Springer-Verlag , 2009.
|
||||
doi: 10.1007/978-3-642-12459-4_18
|
||||
|
||||
A BibTeX entry for LaTeX users is
|
||||
|
||||
@InCollection{ brucker.ea:integrating:2009,
|
||||
title = {Integrating Automated and Interactive Protocol
|
||||
Verification},
|
||||
author = {Achim D. Brucker and Sebastian A. M{\"o}dersheim},
|
||||
booktitle = {Workshop on Formal Aspects in Security and Trust (FAST
|
||||
2009)},
|
||||
publisher = {Springer-Verlag},
|
||||
address = {Heidelberg},
|
||||
series = {Lecture Notes in Computer Science},
|
||||
number = {5983},
|
||||
categories = {isabelleofmc},
|
||||
pages = {248--262},
|
||||
doi = {10.1007/978-3-642-12459-4_18},
|
||||
editor = {Pierpaolo Degano and Joshua Guttman},
|
||||
year = {2009},
|
||||
classification= {workshop},
|
||||
keywords = {protocol verification, model-checking, theorem proving},
|
||||
areas = {security, formal methods},
|
||||
public = {yes},
|
||||
abstract = {A number of current automated protocol verification tools
|
||||
are based on abstract interpretation techniques and other
|
||||
over-approximations of the set of reachable states or
|
||||
traces. The protocol models that these tools employ are
|
||||
shaped by the needs of automated verification and require
|
||||
subtle assumptions. Also, a complex verification tool may
|
||||
suffer from implementation bugs so that in the worst case
|
||||
the tool could accept some incorrect protocols as being
|
||||
correct. These risks of errors are also present, but
|
||||
considerably smaller, when using an LCF-style theorem
|
||||
prover like Isabelle. The interactive security proof,
|
||||
however, requires a lot of expertise and time.
|
||||
|
||||
We combine the advantages of both worlds by using the
|
||||
representation of the over-approx\-imated search space
|
||||
computed by the automated tools as a ``proof idea'' in
|
||||
Isabelle. Thus, we devise proof tactics for Isabelle that
|
||||
generate the correctness proof of the protocol from the
|
||||
output of the automated tools. In the worst case, these
|
||||
tactics fail to construct a proof, namely when the
|
||||
representation of the search space is for some reason
|
||||
incorrect. However, when they succeed, the correctness only
|
||||
relies on the basic model and the Isabelle core.},
|
||||
pdf = {https://www.brucker.ch/bibliography/download/2009/brucker.ea-integrating-2009.pdf},
|
||||
note = {An extended version of this paper is available as IBM
|
||||
Research Technical Report, RZ3750.},
|
||||
filelabel = {Extended Version},
|
||||
file = {https://www.brucker.ch/bibliography/download/2009/brucker.ea-integrating-2009-b.pdf},
|
||||
url = {https://www.brucker.ch/bibliography/abstract/brucker.ea-integrating-2009}
|
||||
}
|
||||
|
35
COPYING
35
COPYING
|
@ -1,35 +0,0 @@
|
|||
Isabelle-OFMC --- Connecting OFMC and Isabelle/HOL
|
||||
==================================================
|
||||
|
||||
Copyright (c) 2009 Achim D. Brucker, Germany
|
||||
|
||||
All rights reserved.
|
||||
|
||||
Redistribution and use in source and binary forms, with or without
|
||||
modification, are permitted provided that the following conditions are
|
||||
met:
|
||||
|
||||
* Redistributions of source code must retain the above copyright
|
||||
notice, this list of conditions and the following disclaimer.
|
||||
|
||||
* Redistributions in binary form must reproduce the above
|
||||
copyright notice, this list of conditions and the following
|
||||
disclaimer in the documentation and/or other materials provided
|
||||
with the distribution.
|
||||
|
||||
* Neither the name of the copyright holders nor the names of its
|
||||
contributors may be used to endorse or promote products derived
|
||||
from this software without specific prior written permission.
|
||||
|
||||
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
||||
"AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
||||
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
||||
A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
||||
OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
||||
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
||||
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
||||
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
||||
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
||||
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
|
|
@ -1,3 +0,0 @@
|
|||
|
||||
2009-11-02 Achim D. Brucker <brucker@member.fsf.org>
|
||||
* Isabelle/OFMC: first public release (development version)
|
|
@ -0,0 +1,24 @@
|
|||
Copyright (c) 2013-2015, Achim D. Brucker
|
||||
2013-2015, Helmut Petritsch
|
||||
All rights reserved.
|
||||
|
||||
Redistribution and use in source and binary forms, with or without
|
||||
modification, are permitted provided that the following conditions are met:
|
||||
|
||||
* Redistributions of source code must retain the above copyright notice, this
|
||||
list of conditions and the following disclaimer.
|
||||
|
||||
* Redistributions in binary form must reproduce the above copyright notice,
|
||||
this list of conditions and the following disclaimer in the documentation
|
||||
and/or other materials provided with the distribution.
|
||||
|
||||
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
||||
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
||||
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
|
||||
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
|
||||
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
|
||||
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
|
||||
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
||||
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
Reference in New Issue