International Conference on Software Technology and Engineering (ICSTE 2012)
Download citation file:
We present in this paper a practical application of the Spin model checker for verifying cryptographic protocols was shown. Using the model so built, Spin can find a known attack on the protocol and it correctly validates the fixed version of the protocol. The experimental results for this cryptographic Public-key protocol convince us the method is useful. Our technique supports a protocol designer to provide formal analysis of the security properties. We illustrate the utility of our technique by exposing an attack on the well-studied two nodes protocol.