This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
The Interrogator: Protocol Secuity Analysis
February 1987 (vol. 13 no. 2)
pp. 274-288
J.K. Millen, MITRE Corporation
The Interrogator is a Prolog program that searches for security vulnerabilities in network protocols for automatic cryptographic key distribution. Given a formal specification of the protocol, it looks for message modification attacks that defeat the protocol objective. It is still under developement, but is has been able to rediscover a known vulnerability in a published protocol. It is implemented in LM-Prolog on a Lisp Machine, with a graphical user interface.
Index Terms:
protocol verification, Active wiretapping, computer security, key distribution, network security, Prolog
Citation:
J.K. Millen, S.C. Clark, S.B. Freedman, "The Interrogator: Protocol Secuity Analysis," IEEE Transactions on Software Engineering, vol. 13, no. 2, pp. 274-288, Feb. 1987, doi:10.1109/TSE.1987.233151
Usage of this product signifies your acceptance of the Terms of Use.