Security protocol verification: Symbolic and computational models

B Blanchet - International conference on principles of security and …, 2012‏ - Springer
Security protocol verification has been a very active research area since the 1990s. This
paper surveys various approaches in this area, considering the verification in the symbolic …

Modeling and verifying security protocols with the applied pi calculus and ProVerif

B Blanchet - Foundations and Trends® in Privacy and …, 2016‏ - nowpublishers.com
ProVerif is an automatic symbolic protocol verifier. It supports a wide range of cryptographic
primitives, defined by rewrite rules or by equations. It can prove various security properties …

Automated security protocol analysis with the AVISPA tool

L Vigano - Electronic Notes in Theoretical Computer Science, 2006‏ - Elsevier
The AVISPA Tool is a push-button tool for the Automated Validation of Internet Security
Protocols and Applications. It provides a modular and expressive formal language for …

Automated analysis of Diffie-Hellman protocols and advanced security properties

B Schmidt, S Meier, C Cremers… - 2012 IEEE 25th …, 2012‏ - ieeexplore.ieee.org
We present a general approach for the symbolic analysis of security protocols that use Diffie-
Hellman exponentiation to achieve advanced security properties. We model protocols as …

OFMC: A symbolic model checker for security protocols

D Basin, S Mödersheim, L Vigano - International Journal of Information …, 2005‏ - Springer
We present the on-the-fly model checker OFMC, a tool that combines two ideas for analyzing
security protocols based on lazy, demand-driven search. The first is the use of lazy data …

Automatic verification of security protocols in the symbolic model: The verifier proverif

B Blanchet - International School on Foundations of Security …, 2012‏ - Springer
After giving general context on the verification of security protocols, we focus on the
automatic symbolic protocol verifier ProVerif. This verifier can prove secrecy, authentication …

The CL-Atse protocol analyser

M Turuani - International conference on rewriting techniques and …, 2006‏ - Springer
This paper presents an overview of the CL-Atse tool, an efficient and versatile automatic
analyser for the security of cryptographic protocols. CL-Atse takes as input a protocol …

Automatic verification of correspondences for security protocols

B Blanchet - Journal of Computer Security, 2009‏ - content.iospress.com
We present a new technique for verifying correspondences in security protocols. In
particular, correspondences can be used to formalize authentication. Our technique is fully …

Deciding knowledge in security protocols under equational theories

M Abadi, V Cortier - Theoretical Computer Science, 2006‏ - Elsevier
The analysis of security protocols requires precise formulations of the knowledge of protocol
participants and attackers. In formal approaches, this knowledge is often treated in terms of …

Automated symbolic proofs of observational equivalence

D Basin, J Dreier, R Sasse - Proceedings of the 22nd ACM SIGSAC …, 2015‏ - dl.acm.org
Many cryptographic security definitions can be naturally formulated as observational
equivalence properties. However, existing automated tools for verifying the observational …