Model checking
n Model checking basics
n The security property we want to verify is expressed
as a temporal logic formula F
n The protocol is expressed as a system S of processes
(the processes involved with the protocol and,
possibly, the intruder)
n S is represented as a labeled transition system T,
which is seen as an interpretation of F
n Model checking consists in showing that T is a model
of F, namely that T validates F
n Always possible with Finite State systems
n Also possible for some restricted cases of Infinite State
systems