@inproceedings{b02b9eb8ab934726b036e157065c2760,
title = "An experiment in ping-pong protocol verification by nondeterministic pushdown automata",
abstract = "An experiment is described that confirms the security of a well-studied class of cryptographic protocols(Dolev-Yao intruder model) can be verified by two-way nondeterministic pushdown automata(2NPDA). A nondeterministic pushdown program checks whether the intersection of a regular language(the protocol to verify) and a given Dyck language containing all canceling words is empty. Ifit is not, an intruder can reveal secret messages sent between trusted users. The verification is guaranteedto terminate in cubic time at most on a 2NPDA-simulator. The interpretive approach used in thisexperiment simplifies the verification, by separating the nondeterministic pushdown logic and programcontrol, and makes it more predictable. We describe the interpretive approach and the knowntransformational solutions, and show they share interesting features. Also noteworthy is how abstractresults from automata theory can solve practical problems by programming language means.",
author = "Robert Gl{\"u}ck",
year = "2018",
month = mar,
day = "23",
doi = "10.4204/EPTCS.268.6",
language = "English",
series = "Electronic Proceedings in Theoretical Computer Science",
publisher = "Open Publishing Association",
pages = "169--184",
editor = "Gallagher, {John P.} and {van Glabbeek}, Rob and Wendelin Serwe",
booktitle = "Proceedings Third Workshop on Models for Formal Analysis of Real Systems and Sixth International Workshop on Verification and Program Transformation. Proceedings",
note = "6th International Workshop on Verification and Program Transformation, VPT 18 ; Conference date: 20-04-2018",
}