isabelle-ofmc

Isabelle/OFMC - Linking OFMC and Isabelle/HOL

https://github.com/logicalhacking/isabelle-ofmc

Science Score: 44.0%

This score indicates how likely this project is to be science-related based on various indicators:

  • CITATION.cff file
    Found CITATION.cff file
  • codemeta.json file
    Found codemeta.json file
  • .zenodo.json file
  • DOI references
    Found 7 DOI reference(s) in README
  • Academic publication links
  • Academic email domains
  • Institutional organization owner
  • JOSS paper metadata
  • Scientific vocabulary similarity
    Low similarity (9.6%) to scientific vocabulary

Keywords

isabelle-hol ofmc protocol-security
Last synced: 6 months ago · JSON representation ·

Repository

Isabelle/OFMC - Linking OFMC and Isabelle/HOL

Basic Info
Statistics
  • Stars: 1
  • Watchers: 4
  • Forks: 0
  • Open Issues: 0
  • Releases: 0
Topics
isabelle-hol ofmc protocol-security
Created over 9 years ago · Last pushed about 5 years ago
Metadata Files
Readme License Citation

README.md

Isabelle/OFMC - Linking OFMC and Isabelle/HOL

This is a developer release for Isabelle/OFMC, i.e., while it may be of interested to experts, it is not yet useable by the general public. This development version comprise a small Isabelle theory and a prototypical tool, called anb2thy. Using OFMC's fixed-point module, anb2thy generate a Isabelle theory (for Isabelle 2016) file for protocols that haven been successfully validated by OFMC.

This project has been superseded by Automated Stateful Protocol Verification and is no longer maintained. In contrast, Automated Stateful Protocol Verification is actively maintained and also, as official entry of the Archive of Formal Proofs, always supports the latest version of Isabelle. More information about the Automated Stateful Protocol Verification project (including its source code) is available in the AFP:

The following publication provides a more abstract description of the underlying theory:

  • Andreas V. Hess, Sebastian Mödersheim, Achim D. Brucker, and Anders Schlichtkrull. Performing Security Proofs of Stateful Protocols. In 34th IEEE Computer Security Foundations Symposium (CSF). IEEE,
    1. doi:10.1109/CSF51468.2021.00006. https://www.brucker.ch/bibliography/abstract/brucker.ea-web-components-2019

Team

License

This project is licensed under a 2-clause BSD-style license.

SPDX-License-Identifier: BSD-2-Clause

Master Repository

The master git repository for this project is hosted by the Software Assurance & Security Research Team at https://git.logicalhacking.com/ProtocolSecurity/isabelle-ofmc.

Publications

Owner

  • Name: Software Assurance & Security Research Team
  • Login: logicalhacking
  • Kind: organization
  • Email: adbrucker@0x5f.org
  • Location: Exeter, UK

Git mirror of the Software Assurance & Security Research Team at the University of Exeter, UK. The team is headed by Achim D. Brucker (@adbrucker).

Citation (CITATION)

To cite ofmc-isabelle, please use
  
  Achim D. Brucker and Sebastian A. Mödersheim. Integrating Automated 
  and Interactive Protocol Verification. In Workshop on Formal Aspects 
  in Security and Trust (FAST 2009). Lecture Notes in Computer Science (5983), 
  pages 248-262, Springer-Verlag , 2009. 
  doi: 10.1007/978-3-642-12459-4_18

A BibTeX entry for LaTeX users is

@InCollection{	  brucker.ea:integrating:2009,
  title		= {Integrating Automated and Interactive Protocol
		  Verification},
  author	= {Achim D. Brucker and Sebastian A. M{\"o}dersheim},
  booktitle	= {Workshop on Formal Aspects in Security and Trust (FAST
		  2009)},
  publisher	= {Springer-Verlag},
  address	= {Heidelberg},
  series	= {Lecture Notes in Computer Science},
  number	= {5983},
  categories	= {isabelleofmc},
  pages		= {248--262},
  doi		= {10.1007/978-3-642-12459-4_18},
  editor	= {Pierpaolo Degano and Joshua Guttman},
  year		= {2009},
  classification= {workshop},
  keywords	= {protocol verification, model-checking, theorem proving},
  areas		= {security, formal methods},
  public	= {yes},
  abstract	= {A number of current automated protocol verification tools
		  are based on abstract interpretation techniques and other
		  over-approximations of the set of reachable states or
		  traces. The protocol models that these tools employ are
		  shaped by the needs of automated verification and require
		  subtle assumptions. Also, a complex verification tool may
		  suffer from implementation bugs so that in the worst case
		  the tool could accept some incorrect protocols as being
		  correct. These risks of errors are also present, but
		  considerably smaller, when using an LCF-style theorem
		  prover like Isabelle. The interactive security proof,
		  however, requires a lot of expertise and time.
		  
		  We combine the advantages of both worlds by using the
		  representation of the over-approx\-imated search space
		  computed by the automated tools as a ``proof idea'' in
		  Isabelle. Thus, we devise proof tactics for Isabelle that
		  generate the correctness proof of the protocol from the
		  output of the automated tools. In the worst case, these
		  tactics fail to construct a proof, namely when the
		  representation of the search space is for some reason
		  incorrect. However, when they succeed, the correctness only
		  relies on the basic model and the Isabelle core.},
  pdf		= {https://www.brucker.ch/bibliography/download/2009/brucker.ea-integrating-2009.pdf},
  note		= {An extended version of this paper is available as IBM
		  Research Technical Report, RZ3750.},
  filelabel	= {Extended Version},
  file		= {https://www.brucker.ch/bibliography/download/2009/brucker.ea-integrating-2009-b.pdf},
  url		= {https://www.brucker.ch/bibliography/abstract/brucker.ea-integrating-2009}
}

GitHub Events

Total
Last Year

Issues and Pull Requests

Last synced: 12 months ago

All Time
  • Total issues: 0
  • Total pull requests: 0
  • Average time to close issues: N/A
  • Average time to close pull requests: N/A
  • Total issue authors: 0
  • Total pull request authors: 0
  • Average comments per issue: 0
  • Average comments per pull request: 0
  • Merged pull requests: 0
  • Bot issues: 0
  • Bot pull requests: 0
Past Year
  • Issues: 0
  • Pull requests: 0
  • Average time to close issues: N/A
  • Average time to close pull requests: N/A
  • Issue authors: 0
  • Pull request authors: 0
  • Average comments per issue: 0
  • Average comments per pull request: 0
  • Merged pull requests: 0
  • Bot issues: 0
  • Bot pull requests: 0
Top Authors
Issue Authors
Pull Request Authors
Top Labels
Issue Labels
Pull Request Labels