Security protocol verification: Symbolic and computational models
B Blanchet - International conference on principles of security and …, 2012 - Springer
Security protocol verification has been a very active research area since the 1990s. This
paper surveys various approaches in this area, considering the verification in the symbolic …
paper surveys various approaches in this area, considering the verification in the symbolic …
Modeling and verifying security protocols with the applied pi calculus and ProVerif
B Blanchet - Foundations and Trends® in Privacy and …, 2016 - nowpublishers.com
ProVerif is an automatic symbolic protocol verifier. It supports a wide range of cryptographic
primitives, defined by rewrite rules or by equations. It can prove various security properties …
primitives, defined by rewrite rules or by equations. It can prove various security properties …
Formal verification of security protocol implementations: a survey
Automated formal verification of security protocols has been mostly focused on analyzing
high-level abstract models which, however, are significantly different from real protocol …
high-level abstract models which, however, are significantly different from real protocol …
Stable multi-target tracking in real-time surveillance video
The majority of existing pedestrian trackers concentrate on maintaining the identities of
targets, however systems for remote biometric analysis or activity recognition in surveillance …
targets, however systems for remote biometric analysis or activity recognition in surveillance …
Verified interoperable implementations of security protocols
We present an architecture and tools for verifying implementations of security protocols. Our
implementations can run with both concrete and symbolic implementations of cryptographic …
implementations can run with both concrete and symbolic implementations of cryptographic …
Modular verification of security protocol code by ty**
We propose a method for verifying the security of protocol implementations. Our method is
based on declaring and enforcing invariants on the usage of cryptography. We develop …
based on declaring and enforcing invariants on the usage of cryptography. We develop …
sElect: a lightweight verifiable remote voting system
Modern remote electronic voting systems, such as the prominent Helios system, are
designed to provide vote privacy and verifiability, where, roughly speaking, the latter means …
designed to provide vote privacy and verifiability, where, roughly speaking, the latter means …
A generic methodology for the modular verification of security protocol implementations
Security protocols are essential building blocks of modern IT systems. Subtle flaws in their
design or implementation may compromise the security of entire systems. It is, thus …
design or implementation may compromise the security of entire systems. It is, thus …
Verifying policy-based security for web services
WS-SecurityPolicy is a declarative configuration language for driving web services security
mechanisms. We describe a formal semantics for WS-SecurityPolicy, and propose a more …
mechanisms. We describe a formal semantics for WS-SecurityPolicy, and propose a more …
Automated verification of Telegram's MTProto 2.0 in the symbolic model
M Miculan, N Vitacolonna - Computers & Security, 2023 - Elsevier
MTProto 2.0 is the suite of security protocols for instant messaging at the core of the popular
Telegram messenger application. In this paper we analyse MTProto 2.0 using ProVerif, a …
Telegram messenger application. In this paper we analyse MTProto 2.0 using ProVerif, a …