Universal concurrent constraint programing: Symbolic semantics and applications to security

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We introduce the Universal Timed Concurrent Constraint Programming (utcc) process calculus; a generalisation of Timed Concurrent Constraint Programming. The utcc calculus allows for the specification of mobile behaviours in the sense of Milner's π-calculus: Generation and communication of private channels or links. We first endow utcc with an operational semantics and then with a symbolic semantics to deal with problematic operational aspects involving infinitely many substitutions and divergent internal computations. The novelty of the symbolic semantics is to use temporal constraints to represent finitely infinitely-many substitutions. We also show that utcc has a strong connection with Pnueli's Temporal Logic. This connection can be used to prove reachability properties of utcc processes. As a compelling example, we use utcc to exhibit the secrecy flaw of the Needham-Schroeder security protocol.

Original languageEnglish
Title of host publicationProceedings of the 23rd Annual ACM Symposium on Applied Computing, SAC'08
Pages145-150
Number of pages6
DOIs
Publication statusPublished - 1 Dec 2008
Event23rd Annual ACM Symposium on Applied Computing, SAC'08 - Fortaleza, Ceara, Brazil
Duration: 16 Mar 200820 Mar 2008

Publication series

NameProceedings of the ACM Symposium on Applied Computing

Conference

Conference23rd Annual ACM Symposium on Applied Computing, SAC'08
Country/TerritoryBrazil
CityFortaleza, Ceara
Period16/03/0820/03/08

Keywords

  • Concurrent constraint programming
  • Mobility
  • Security
  • Symbolic semantics

Fingerprint

Dive into the research topics of 'Universal concurrent constraint programing: Symbolic semantics and applications to security'. Together they form a unique fingerprint.

Cite this