@InProceedings{ basin.ea:lets:2009-b, abstract = {Traditional security protocols are mainly concerned with key establishment and principal authentication and rely on predistributed keys and properties of cryptographic operators. In contrast, new application areas are emerging that establish and rely on properties of the physical world. Examples include protocols for secure localization, distance bounding, and device pairing. We present a formal model that extends inductive, trace-based approaches in two directions. First, we refine the standard Dolev-Yao model to account for network topology, transmission delays, and node positions. This results in a distributed intruder with restricted, but more realistic, communication capabilities. Second, we develop an abstract message theory that formalizes protocol-independent facts about messages, which hold for all instances. When verifying protocols, we instantiate the abstract message theory, modeling the properties of the cryptographic operators under consideration. We have formalized this model in Isabelle/HOL and used it to verify distance bounding protocols where the concrete message theory includes exclusive-or.}, address = {Munich}, author = {David Basin and Srdjan Capkun and Patrick Schaller and Benedikt Schmidt}, booktitle = {Theorem Proving in Higher Order Logics (TPHOLs 2009)}, copyright = {© Springer}, copyrighturl = {http://www.springer.com/computer/foundations/book/978-3-642-03358-2} , editor = {S. Berghofer and T. Nipkow and C. Urban and M. Wenzel(Eds.) }, isbn = {978-3-642-03358-2}, language = {USenglish}, month = 08, note = {invited talk}, pages = {1--22}, publisher = {Springer}, series = {LNCS}, title = {Let's Get Physical: Models and Methods for Real-World Security Protocols}, url = {http://www.springerlink.com/content/2000141705v32257/?p=8c12f46c9c974ba08e17c8832164ffe7&pi=0} , volume = 5674, year = 2009, user = {bgeiser} }