Verification and Attack Synthesis for Network Protocols
By: Max von Hippel
Potential Business Impact:
Finds bugs in computer communication rules.
Network protocols are programs with inputs and outputs that follow predefined communication patterns to synchronize and exchange information. There are many protocols and each serves a different purpose, e.g., routing, transport, secure communication, etc. The functional and performance requirements for a protocol can be expressed using a formal specification, such as, a set of logical predicates over its traces. A protocol could be prevented from achieving its requirements due to a bug in its design or implementation, a component failure (e.g., a crash), or an attack. This dissertation shows that formal methods can feasibly characterize the functionality and performance of network protocols under normal conditions as well as when subjected to attacks.
Similar Papers
It Takes a Village: Bridging the Gaps between Current and Formal Specifications for Protocols
Networking and Internet Architecture
Makes internet rules clear and safe.
Formal Verification of Physical Layer Security Protocols for Next-Generation Communication Networks (extended version)
Cryptography and Security
Checks computer secrets better than before.
Formal Verification of Physical Layer Security Protocols for Next-Generation Communication Networks
Cryptography and Security
Makes computer security checks easier and more thorough.