메뉴 건너뛰기




Volumn 3385, Issue , 2005, Pages 363-379

Cryptographic protocol analysis on real C code

Author keywords

[No Author keywords available]

Indexed keywords

C (PROGRAMMING LANGUAGE); CODES (SYMBOLS); CRYPTOGRAPHY; PROBLEM SOLVING; SECURITY OF DATA;

EID: 24144470036     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-30579-8_24     Document Type: Conference Paper
Times cited : (89)

References (27)
  • 1
    • 84874678490 scopus 로고    scopus 로고
    • On name generation and set-based analysis in the Dolev-Yao model
    • 13th International Conference on Concurrency Theory CONCUR'02. Springer-Verlag
    • R. M. Amadio and W. Charatonik. On name generation and set-based analysis in the Dolev-Yao model. In 13th International Conference on Concurrency Theory CONCUR'02, volume 2421 of Lecture Notes in Computer Science, pages 499-514. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2421 , pp. 499-514
    • Amadio, R.M.1    Charatonik, W.2
  • 3
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on prolog rules
    • Cape Breton, Nova Scotia, Canada, June. IEEE Computer Society
    • B. Blanchet. An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In 14th IEEE Computer Security Foundations Workshop (CSFW-14), pages 82-96, Cape Breton, Nova Scotia, Canada, June 2001. IEEE Computer Society.
    • (2001) 14th IEEE Computer Security Foundations Workshop (CSFW-14) , pp. 82-96
    • Blanchet, B.1
  • 4
    • 84887962732 scopus 로고    scopus 로고
    • Design and implementation of a special-purpose static program analyzer for safety-critical real-time embedded software, invited chapter
    • T. Mogensen, D. A. Schmidt, and I. H. Sudborough, editors, The Essence of Computation: Complexity, Analysis, Transformation. Essays Dedicated to Neil D. Jones. Springer Verlag, Dec.
    • B. Blanchet, P. Cousot, R. Cousot, J. Feret, L. Mauborgne, A. Miné, D. Monniaux, and X. Rival. Design and Implementation of a Special-Purpose Static Program Analyzer for Safety-Critical Real-Time Embedded Software, invited chapter. In T. Mogensen, D. A. Schmidt, and I. H. Sudborough, editors, The Essence of Computation: Complexity, Analysis, Transformation. Essays Dedicated to Neil D. Jones, volume 2566 of Lecture Notes on Computer Science, pages 85-108. Springer Verlag, Dec. 2002.
    • (2002) Lecture Notes on Computer Science , vol.2566 , pp. 85-108
    • Blanchet, B.1    Cousot, P.2    Cousot, R.3    Feret, J.4    Mauborgne, L.5    Miné, A.6    Monniaux, D.7    Rival, X.8
  • 7
    • 35248860689 scopus 로고    scopus 로고
    • Security properties: Two agents are sufficient
    • Warsaw, Poland, Apr. Springer-Verlag LNCS 2618
    • H. Comon-Lundh and V. Cortier. Security properties: Two agents are sufficient. In Proc. 12th European Symposium on Programming (ESOP'2003), pages 99-113, Warsaw, Poland, Apr. 2003. Springer-Verlag LNCS 2618.
    • (2003) Proc. 12th European Symposium on Programming (ESOP'2003) , pp. 99-113
    • Comon-Lundh, H.1    Cortier, V.2
  • 11
    • 84860984286 scopus 로고    scopus 로고
    • Exploitation avancée de buffer overflows
    • LASEC, Ecole Polytechnique Fédérale de Lausanne, June
    • O. Gay. Exploitation avancée de buffer overflows. Technical report, LASEC, Ecole Polytechnique Fédérale de Lausanne, June 2002. http://diwww.epfl.ch/~ogay/advbof/advbof.pdf.
    • (2002) Technical Report
    • Gay, O.1
  • 13
    • 20144382303 scopus 로고    scopus 로고
    • Une fois qu'on n'a pas trouvé de preuve, comment le faire comprendre à un assistant de preuve ?
    • Sainte-Marie-de-Ré France, Janvier. INRIA
    • J. Goubault-Larrecq. Une fois qu'on n'a pas trouvé de preuve, comment le faire comprendre à un assistant de preuve ? In Actes 15èmes journées francophones sur les langages applicatifs (JFLA'04), Sainte-Marie-de-Ré France, Janvier 2004. INRIA.
    • (2004) Actes 15èmes Journées Francophones sur les Langages Applicatifs (JFLA'04)
    • Goubault-Larrecq, J.1
  • 16
    • 33645606517 scopus 로고    scopus 로고
    • Automatic verification of confidentiality properties of cryptographic programs
    • N. E. Kadhi. Automatic verification of confidentiality properties of cryptographic programs. Networking and Information Systems, 3(6), 2001.
    • (2001) Networking and Information Systems , vol.3 , Issue.6
    • Kadhi, N.E.1
  • 17
    • 28144456308 scopus 로고
    • An attack on the needham-schroeder public-key authentication protocol
    • G. Lowe. An attack on the needham-schroeder public-key authentication protocol. Information Processing Letters, 56(3): 131-133, 1995.
    • (1995) Information Processing Letters , vol.56 , Issue.3 , pp. 131-133
    • Lowe, G.1
  • 19
    • 0018048246 scopus 로고
    • Using encryption for authentification in large networks of computers
    • December
    • R. Needham and M. Schroeder. Using encryption for authentification in large networks of computers. Communications of the ACM, 21(12), December 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12
    • Needham, R.1    Schroeder, M.2
  • 22
    • 0039488517 scopus 로고    scopus 로고
    • Parametric shape analysis via 3-valued logic
    • may
    • S. Sagiv, T. W. Reps, and R. Wilhelm. Parametric shape analysis via 3-valued logic. ACM Trans. Prog. Lang. Sys., 24(3):217-298, may 2002.
    • (2002) ACM Trans. Prog. Lang. Sys. , vol.24 , Issue.3 , pp. 217-298
    • Sagiv, S.1    Reps, T.W.2    Wilhelm, R.3
  • 23
    • 19144364839 scopus 로고    scopus 로고
    • Models for an adversary-centric protocol logic
    • July Proceedings of the 1st Workshop on Logical Aspects of Cryptographic Protocol Verification (LACPV'01), J. Goubault-Larrecq, ed.
    • P. Selinger. Models for an adversary-centric protocol logic. Electronic Notes in Theoretical Computer Science, 55(1):73-87, July 2001. Proceedings of the 1st Workshop on Logical Aspects of Cryptographic Protocol Verification (LACPV'01), J. Goubault-Larrecq, ed.
    • (2001) Electronic Notes in Theoretical Computer Science , vol.55 , Issue.1 , pp. 73-87
    • Selinger, P.1
  • 26
    • 0001592091 scopus 로고    scopus 로고
    • Towards an automatic analysis of security protocols
    • H. Ganzinger, editor. Springer
    • C. Weidenbach. Towards an automatic analysis of security protocols. In H. Ganzinger, editor, 16th International Conference on Automated Deduction CADE-16, volume 1632, pages 378-382. Springer, 1999.
    • (1999) 16th International Conference on Automated Deduction CADE-16 , vol.1632 , pp. 378-382
    • Weidenbach, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.