The Community for Technology Leaders
Green Image
Issue No. 02 - February (1987 vol. 13)
ISSN: 0098-5589
pp: 274-288
J.K. Millen , MITRE Corporation
ABSTRACT
The Interrogator is a Prolog program that searches for security vulnerabilities in network protocols for automatic cryptographic key distribution. Given a formal specification of the protocol, it looks for message modification attacks that defeat the protocol objective. It is still under developement, but is has been able to rediscover a known vulnerability in a published protocol. It is implemented in LM-Prolog on a Lisp Machine, with a graphical user interface.
INDEX TERMS
protocol verification, Active wiretapping, computer security, key distribution, network security, Prolog
CITATION
S.B. Freedman, S.C. Clark, J.K. Millen, "The Interrogator: Protocol Secuity Analysis", IEEE Transactions on Software Engineering, vol. 13, no. , pp. 274-288, February 1987, doi:10.1109/TSE.1987.233151
110 ms
(Ver )