Akiss is a verification tool for checking trace equivalence of security protocols. It works in the so-called symbolic model, representing protocols by processes in the applied pi-calculus, and allowing the user to describe various security primitives by an equational theory. In order to show that two processes are trace equivalent, Akiss derives a complete set of tests for each trace of each process, using a saturation procedure that performs Horn clause resolution with selection.

References in zbMATH (referenced in 13 articles , 1 standard article )

Showing results 1 to 13 of 13.
Sorted by year (citations)

  1. Erbatur, Serdar; Marshall, Andrew M.; Ringeissen, Christophe: Computing knowledge in equational extensions of subterm convergent theories (2020)
  2. Marcos del Blanco, David Yeregui; Panizo Alonso, Luis; Hermida Alonso, Jose Angel: Review of cryptographic schemes applied to remote electronic voting systems: remaining challenges and the upcoming post-quantum paradigm (2018)
  3. Arapinis, Myrto; Liu, Jia; Ritter, Eike; Ryan, Mark: Stateful applied pi calculus: observational equivalence and labelled bisimilarity (2017)
  4. Babel, Kushal; Cheval, Vincent; Kremer, Steve: On communication models when verifying equivalence properties (2017)
  5. Baelde, David; Delaune, Stéphanie; Hirschi, Lucca: A reduced semantics for deciding trace equivalence (2017)
  6. Cheval, Vincent; Comon-Lundh, Hubert; Delaune, Stéphanie: A procedure for deciding symbolic equivalence between sets of constraint systems (2017)
  7. Delaune, Stéphanie; Hirschi, Lucca: A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols (2017)
  8. Dreier, Jannik; Duménil, Charles; Kremer, Steve; Sasse, Ralf: Beyond subterm-convergent equational theories in automated verification of stateful protocols (2017)
  9. Kassem, Ali; Falcone, Yliès; Lafourcade, Pascal: Formal analysis and offline monitoring of electronic exams (2017)
  10. Chadha, Rohit; Cheval, Vincent; Ciobâcă, Ştefan; Kremer, Steve: Automated verification of equivalence properties of cryptographic protocols (2016)
  11. Tiu, Alwen; Nguyen, Nam; Horne, Ross: SPEC: an equivalence checker for security protocols (2016)
  12. Cheval, Vincent; Cortier, Véronique; Delaune, Stéphanie: Deciding equivalence-based properties using constraint solving (2013)
  13. Chadha, Rohit; Ciobâcă, Ştefan; Kremer, Steve: Automated verification of equivalence properties of cryptographic protocols (2012)