@Article{ modersheim.ea:constraint:2010, abstract = {We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation works by eliminating certain kinds of redundancies that arise in the search space when using constraints to represent and manipulate the messages that may be sent by an active intruder. We define constraint differentiation in a general way, independent of the technical and conceptual details of the underlying constraint-based method and protocol model. Formally, we prove that constraint differentiation terminates and is correct, under the assumption that the original constraint-based approach has these properties. Practically, as a concrete case study, we have integrated this technique into OFMC, a state-of-the-art model-checker for security protocol analysis, and demonstrated its effectiveness by extensive experimentation. Our results show that constraint differentiation substantially reduces search and considerably improves the performance of OFMC, enabling its application to a wider class of problems.}, author = {Sebastian M{\"o}dersheim and Luca Vigan{\`o} and David A. Basin}, journal = {Journal of Computer Security}, language = {USenglish}, month = 6, number = 4, pages = {575--618}, title = {Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols}, url = {http://dx.doi.org/10.3233/JCS-2009-0351}, volume = 18, year = 2010, user = {bgeiser} }