Security protocol verification: Symbolic and computational models
B Blanchet - International conference on principles of security and …, 2012 - Springer
Security protocol verification has been a very active research area since the 1990s. This
paper surveys various approaches in this area, considering the verification in the symbolic …
paper surveys various approaches in this area, considering the verification in the symbolic …
An empirical study of cryptographic misuse in android applications
Developers use cryptographic APIs in Android with the intent of securing data such as
passwords and personal information on mobile devices. In this paper, we ask whether …
passwords and personal information on mobile devices. In this paper, we ask whether …
Modeling and verifying security protocols with the applied pi calculus and ProVerif
B Blanchet - Foundations and Trends® in Privacy and …, 2016 - nowpublishers.com
ProVerif is an automatic symbolic protocol verifier. It supports a wide range of cryptographic
primitives, defined by rewrite rules or by equations. It can prove various security properties …
primitives, defined by rewrite rules or by equations. It can prove various security properties …
Protocol state fuzzing of {TLS} implementations
We describe a largely automated and systematic analysis of TLS implementations by what
we call 'protocol state fuzzing': we use state machine learning to infer state machines from …
we call 'protocol state fuzzing': we use state machine learning to infer state machines from …
Formal verification of security protocol implementations: a survey
Automated formal verification of security protocols has been mostly focused on analyzing
high-level abstract models which, however, are significantly different from real protocol …
high-level abstract models which, however, are significantly different from real protocol …
SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements
Internet users today depend daily on HTTPS for secure communication with sites they intend
to visit. Over the years, many attacks on HTTPS and the certificate trust model it uses have …
to visit. Over the years, many attacks on HTTPS and the certificate trust model it uses have …
The applied pi calculus: Mobile values, new names, and secure communication
We study the interaction of the programming construct “new,” which generates statically
scoped names, with communication via messages on channels. This interaction is crucial in …
scoped names, with communication via messages on channels. This interaction is crucial in …
On the security of TLS-DHE in the standard model
TLS is the most important cryptographic protocol in use today. However, up to now there is
no complete cryptographic security proof in the standard model, nor in any other model. We …
no complete cryptographic security proof in the standard model, nor in any other model. We …
[PDF][PDF] ProVerif 2.00: automatic cryptographic protocol verifier, user manual and tutorial
This manual describes the ProVerif software package version 2.05. ProVerif is a tool for
automatically analyzing the security of cryptographic protocols. Support is provided for, but …
automatically analyzing the security of cryptographic protocols. Support is provided for, but …
Refinement types for secure implementations
We present the design and implementation of a typechecker for verifying security properties
of the source code of cryptographic protocols and access control mechanisms. The …
of the source code of cryptographic protocols and access control mechanisms. The …