Modeling and verifying security protocols with the applied pi calculus and ProVerif

B Blanchet - Foundations and Trends® in Privacy and …, 2016 - nowpublishers.com
ProVerif is an automatic symbolic protocol verifier. It supports a wide range of cryptographic
primitives, defined by rewrite rules or by equations. It can prove various security properties …

SoK: Computer-aided cryptography

M Barbosa, G Barthe, K Bhargavan… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Computer-aided cryptography is an active area of research that develops and applies
formal, machine-checkable approaches to the design, analysis, and implementation of …

The applied pi calculus: Mobile values, new names, and secure communication

M Abadi, B Blanchet, C Fournet - Journal of the ACM (JACM), 2017 - dl.acm.org
We study the interaction of the programming construct “new,” which generates statically
scoped names, with communication via messages on channels. This interaction is crucial in …

Proverif with lemmas, induction, fast subsumption, and much more

B Blanchet, V Cheval, V Cortier - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
This paper presents a major overhaul of one the most widely used symbolic security protocol
verifiers, ProVerif. We provide two main contributions. First, we extend ProVerif with lemmas …

An interactive prover for protocol verification in the computational model

D Baelde, S Delaune, C Jacomme… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Given the central importance of designing secure protocols, providing solid mathematical
foundations and computer-assisted methods to attest for their correctness is becoming …

DEEPSEC: deciding equivalence properties in security protocols theory and practice

V Cheval, S Kremer… - 2018 IEEE symposium on …, 2018 - ieeexplore.ieee.org
Automated verification has become an essential part in the security evaluation of
cryptographic protocols. Recently, there has been a considerable effort to lift the theory and …

Automated symbolic proofs of observational equivalence

D Basin, J Dreier, R Sasse - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
Many cryptographic security definitions can be naturally formulated as observational
equivalence properties. However, existing automated tools for verifying the observational …

Sok: Secure e-voting with everlasting privacy

T Haines, J Mueller, R Mosaheb… - Privacy Enhancing …, 2023 - orbilu.uni.lu
Vote privacy is a fundamental right, which needs to be protected not only during an election,
or for a limited time afterwards, but for the foreseeable future. Numerous electronic voting (e …

Formal models and techniques for analyzing security protocols: A tutorial

V Cortier, S Kremer - Foundations and Trends® in …, 2014 - nowpublishers.com
Security protocols are distributed programs that aim at securing communications by the
means of cryptography. They are for instance used to secure electronic payments, home …

Decision and complexity of Dolev-Yao hyperproperties

I Rakotonirina, G Barthe, C Schneidewind - Proceedings of the ACM on …, 2024 - dl.acm.org
The formal analysis of cryptographic protocols traditionally focuses on trace and
equivalence properties, for which decision procedures in the symbolic (or Dolev-Yao, or DY) …