3rd International ICST Symposium on Information Assurance and Security

Research Article

Modeling Security Protocols as Games

  • @INPROCEEDINGS{10.1109/IAS.2007.44,
        author={ Mohamed  Saleh and Mourad  Debbabi},
        title={Modeling Security Protocols as Games},
        proceedings={3rd International ICST Symposium on  Information Assurance and Security},
        publisher={IEEE},
        proceedings_a={IAS},
        year={2007},
        month={9},
        keywords={Game semantics  Modeling cryptographic protocols.  Security protocols},
        doi={10.1109/IAS.2007.44}
    }
    
  • Mohamed Saleh
    Mourad Debbabi
    Year: 2007
    Modeling Security Protocols as Games
    IAS
    IEEE
    DOI: 10.1109/IAS.2007.44
Mohamed Saleh1,*, Mourad Debbabi1,*
  • 1: Concordia Institute for Information Systems Engineering Concordia University Montreal, Quebec, Canada
*Contact email: m_saleh@ciise.concordia.ca, debbabi@ciise.concordia.ca

Abstract

We model security protocols as a game tree using concepts of game semantics. The model interprets protocol specifications as strategies over a game tree that represents the type of the protocol. The specifications are written in the simple arrow notation commonly used. The model allows us to give formal semantics to this notation. Furthermore, the model can be used for verification of various security properties.