Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment

Omar Almousa, Sebastian Mödersheim, Paolo Modesti, Luca Viganò

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    236 Downloads (Pure)

    Abstract

    We integrate, and improve upon, prior relative soundness results of two kinds. The first kind are typing results showing that any security protocol that fulfils a number of sufficient conditions has an attack if it has a well-typed attack. The second kind considers the parallel composition of protocols, showing that when running two protocols in parallel allows for an attack, then at least one of the protocols has an attack in isolation. The most important generalization over previous work is the support for all security properties of the geometric fragment.
    Original languageEnglish
    Title of host publicationProceedings, Part II, Computer Security - ESORICS 2015
    EditorsGünther Pernul, Peter Y. A. Ryan, Edgar R. Weippl
    PublisherSpringer
    Pages209-229
    Number of pages21
    Volume9327
    DOIs
    Publication statusPublished - 2015
    Event20th European Symposium on Research in Computer Security - Vienna, Austria
    Duration: 21 Sep 201525 Sep 2015

    Publication series

    NameLecture Notes in Computer Science
    PublisherSpringer

    Conference

    Conference20th European Symposium on Research in Computer Security
    Abbreviated titleESORICS 2015
    CountryAustria
    CityVienna
    Period21/09/1525/09/15

    Fingerprint Dive into the research topics of 'Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment'. Together they form a unique fingerprint.

    Cite this