diff --git a/publications.bib b/publications.bib index b42c146d5ede9dd738af946fd355f83ac79caf17..9be1320a62111638b62747100378d11a257d8016 100644 --- a/publications.bib +++ b/publications.bib @@ -1832,7 +1832,32 @@ author = {Emanuele D'Osualdo and title = {(Submitted) TaDA Live: Compositional Reasoning for Termination of Fine-grained Concurrent Programs}, year = {2020}, } - +@InProceedings{DOsualdoS2020Decidable, +author = {Emanuele D'Osualdo and + Felix Stutz}, +editor = {Igor Konnov and + Laura Kov{\'{a}}cs}, +title = {Decidable Inductive Invariants for Verification of Cryptographic Protocols + with Unbounded Sessions}, +booktitle = {31st International Conference on Concurrency Theory, {CONCUR} 2020, + September 1-4, 2020, Vienna, Austria (Virtual Conference)}, +series = {LIPIcs}, +volume = {171}, +pages = {31:1--31:23}, +publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, +year = {2020}, +url = {https://doi.org/10.4230/LIPIcs.CONCUR.2020.31}, +doi = {10.4230/LIPIcs.CONCUR.2020.31}, +abstract = {We develop a theory of decidable inductive invariants for an infinite-state variant of the Applied +Ï€-calculus, with applications to automatic verification of stateful cryptographic protocols with +unbounded sessions/nonces. Since the problem is undecidable in general, we introduce depth-bounded +protocols, a strict generalisation of a class from the literature, for which our decidable analysis is +sound and complete. Our core contribution is a procedure to check that an invariant is inductive, +which implies that every reachable configuration satisfies it. Our invariants can capture security +properties like secrecy, can be inferred automatically, and represent an independently checkable +certificate of correctness. We provide a prototype implementation and we report on its performance +on some textbook examples.}, +} @Comment{jabref-meta: databaseType:bibtex;}