Security protocol verification: Symbolic and computational models
Security protocol verification has been a very active research area since the 1990s. This
paper surveys various approaches in this area, considering the verification in the symbolic …
paper surveys various approaches in this area, considering the verification in the symbolic …
Modeling and verifying security protocols with the applied pi calculus and ProVerif
ProVerif is an automatic symbolic protocol verifier. It supports a wide range of cryptographic
primitives, defined by rewrite rules or by equations. It can prove various security properties …
primitives, defined by rewrite rules or by equations. It can prove various security properties …
Automated security protocol analysis with the AVISPA tool
The AVISPA Tool is a push-button tool for the Automated Validation of Internet Security
Protocols and Applications. It provides a modular and expressive formal language for …
Protocols and Applications. It provides a modular and expressive formal language for …
Automated analysis of Diffie-Hellman protocols and advanced security properties
We present a general approach for the symbolic analysis of security protocols that use Diffie-
Hellman exponentiation to achieve advanced security properties. We model protocols as …
Hellman exponentiation to achieve advanced security properties. We model protocols as …
OFMC: A symbolic model checker for security protocols
We present the on-the-fly model checker OFMC, a tool that combines two ideas for analyzing
security protocols based on lazy, demand-driven search. The first is the use of lazy data …
security protocols based on lazy, demand-driven search. The first is the use of lazy data …
Automatic verification of security protocols in the symbolic model: The verifier proverif
After giving general context on the verification of security protocols, we focus on the
automatic symbolic protocol verifier ProVerif. This verifier can prove secrecy, authentication …
automatic symbolic protocol verifier ProVerif. This verifier can prove secrecy, authentication …
The CL-Atse protocol analyser
M Turuani - International conference on rewriting techniques and …, 2006 - Springer
This paper presents an overview of the CL-Atse tool, an efficient and versatile automatic
analyser for the security of cryptographic protocols. CL-Atse takes as input a protocol …
analyser for the security of cryptographic protocols. CL-Atse takes as input a protocol …
Automatic verification of correspondences for security protocols
We present a new technique for verifying correspondences in security protocols. In
particular, correspondences can be used to formalize authentication. Our technique is fully …
particular, correspondences can be used to formalize authentication. Our technique is fully …
Deciding knowledge in security protocols under equational theories
The analysis of security protocols requires precise formulations of the knowledge of protocol
participants and attackers. In formal approaches, this knowledge is often treated in terms of …
participants and attackers. In formal approaches, this knowledge is often treated in terms of …
Automated symbolic proofs of observational equivalence
Many cryptographic security definitions can be naturally formulated as observational
equivalence properties. However, existing automated tools for verifying the observational …
equivalence properties. However, existing automated tools for verifying the observational …