Security protocol verification: Symbolic and computational models

B Blanchet - International conference on principles of security and …, 2012 - Springer
Security protocol verification has been a very active research area since the 1990s. This
paper surveys various approaches in this area, considering the verification in the symbolic …

Modeling and verifying security protocols with the applied pi calculus and ProVerif

B Blanchet - Foundations and Trends® in Privacy and …, 2016 - nowpublishers.com
ProVerif is an automatic symbolic protocol verifier. It supports a wide range of cryptographic
primitives, defined by rewrite rules or by equations. It can prove various security properties …

Formal verification of security protocol implementations: a survey

M Avalle, A Pironti, R Sisto - Formal Aspects of Computing, 2014 - Springer
Automated formal verification of security protocols has been mostly focused on analyzing
high-level abstract models which, however, are significantly different from real protocol …

Stable multi-target tracking in real-time surveillance video

B Benfold, I Reid - CVPR 2011, 2011 - ieeexplore.ieee.org
The majority of existing pedestrian trackers concentrate on maintaining the identities of
targets, however systems for remote biometric analysis or activity recognition in surveillance …

Verified interoperable implementations of security protocols

K Bhargavan, C Fournet, AD Gordon… - ACM Transactions on …, 2008 - dl.acm.org
We present an architecture and tools for verifying implementations of security protocols. Our
implementations can run with both concrete and symbolic implementations of cryptographic …

Modular verification of security protocol code by ty**

K Bhargavan, C Fournet, AD Gordon - ACM Sigplan Notices, 2010 - dl.acm.org
We propose a method for verifying the security of protocol implementations. Our method is
based on declaring and enforcing invariants on the usage of cryptography. We develop …

sElect: a lightweight verifiable remote voting system

R Küsters, J Müller, E Scapin… - 2016 IEEE 29th …, 2016 - ieeexplore.ieee.org
Modern remote electronic voting systems, such as the prominent Helios system, are
designed to provide vote privacy and verifiability, where, roughly speaking, the latter means …

A generic methodology for the modular verification of security protocol implementations

L Arquint, M Schwerhoff, V Mehta, P Müller - Proceedings of the 2023 …, 2023 - dl.acm.org
Security protocols are essential building blocks of modern IT systems. Subtle flaws in their
design or implementation may compromise the security of entire systems. It is, thus …

Verifying policy-based security for web services

K Bhargavan, C Fournet, AD Gordon - … of the 11th ACM conference on …, 2004 - dl.acm.org
WS-SecurityPolicy is a declarative configuration language for driving web services security
mechanisms. We describe a formal semantics for WS-SecurityPolicy, and propose a more …

Automated verification of Telegram's MTProto 2.0 in the symbolic model

M Miculan, N Vitacolonna - Computers & Security, 2023 - Elsevier
MTProto 2.0 is the suite of security protocols for instant messaging at the core of the popular
Telegram messenger application. In this paper we analyse MTProto 2.0 using ProVerif, a …