Output details
11 - Computer Science and Informatics
King's College London
Constraint differentiation : Search-space reduction for the constraint-based analysis of security protocols
<18>This paper is in the research area, “Security and privacy/Formal methods and theory of security” (with close connections to <04> “Networks/Network protocols/Protocol correctness”). It describes Constraint Differentiation (CD), a powerful technique for reducing search when model-checking security protocols using constraint-based methods. CD is independent of the technical and conceptual details of the underlying constraint-based method and protocol model, and can thus be implemented in any such security protocol analysis tool. CD has been implemented into OFMC, a state-of-the-art model-checker: CD substantially reduces search and considerably improves the performance of OFMC, enabling its application to a wider class of problems.