@InCollection{ basin.ea:constraint:2003, abstract = {We introduce constraint differentiation, a new, general technique for reducing search when model-checking security protocols. The technique is based on eliminating certain kinds of redundancies that arise in the search space when using symbolic exploration methods, which employ constraints to reason about possible messages from an active intruder. Constraint differentiation is correct and complete, in that it neither excludes attacks nor introduces new ones. Our results show that constraint differentiation substantially reduces search and considerably improves the performance of our state-of-the-art protocol model-checker OFMC, enabling its application both to the falsification of industrial-strength protocols and to verification of bounded numbers of sessions of such protocols.}, address = {New York}, author = {David Basin and Sebastian M{\"o}dersheim and Luca Vigan{\`o}}, booktitle = {SPV'03}, language = {USenglish}, title = {Constraint Differentiation: A New Reduction Technique for Constraint-Based Analysis of Security Protocols (Extended Abstract)}, url = {http://www.loria.fr/~rusi/spv.html}, year = 2003 }