Date of Original Version



Book Chapter

Abstract or Description

Most systems designed for the symbolic verification of security protocols operate under the unproved assumption that an attack can only result from the combination of a fixed number of message transformations, which altogether constitute the capabilities of the so-called Dolev-Yao intruder. In this paper,we show that the Dolev-Yao intruder can indeed emulate the actions of an arbitrary symbolic adversary. In order to do so, we extend MSR, a flexible specification framework for security protocols based on typed multiset rewriting, with a static check called data access specification and aimed at catching specification errors such as a principal trying to use a key that she is not entitled to access.




Software Security - Theories and Systems - ISSS 2002, (Revised Papers of the 2002 Mext-NSF-JSPS International Symposium) (M. Okada, B. Pierce, Andre Scedrov, H. Tokuda and A. Yonezawa, editors), pp. 384-416, Springer-Verlag LNCS 2609