The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - February (1987 vol.13)
pp: 274-288
J.K. Millen , MITRE Corporation
ABSTRACT
The Interrogator is a Prolog program that searches for security vulnerabilities in network protocols for automatic cryptographic key distribution. Given a formal specification of the protocol, it looks for message modification attacks that defeat the protocol objective. It is still under developement, but is has been able to rediscover a known vulnerability in a published protocol. It is implemented in LM-Prolog on a Lisp Machine, with a graphical user interface.
INDEX TERMS
protocol verification, Active wiretapping, computer security, key distribution, network security, Prolog
CITATION
J.K. Millen, S.C. Clark, S.B. Freedman, "The Interrogator: Protocol Secuity Analysis", IEEE Transactions on Software Engineering, vol.13, no. 2, pp. 274-288, February 1987, doi:10.1109/TSE.1987.233151
24 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool