Download PDFOpen PDF in browserVerification of Multi-Party Ping-Pong Protocols via Program Transformation15 pages•Published: July 28, 2014AbstractThe paper describes a verification technique based on program transformation with unfolding that allows to find short attacks on multi-party ping-pong protocols in the Dolev-Yao intruder model. Protocols are modelled by prefix grammars, and questions of model optimization and complexity are considered.Keyphrases: ping pong protocols, prefix grammar, supercompilation, verification In: Alexei Lisitsa and Andrei Nemytykh (editors). VPT 2014. Second International Workshop on Verification and Program Transformation, vol 28, pages 84-98.
|