메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 89-98

Verification of low-level crypto-protocol implementations using automated theorem proving

Author keywords

[No Author keywords available]

Indexed keywords

ABSTRACTING; COMPUTER HARDWARE; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY; STANDARDS; THEOREM PROVING;

EID: 33745178885     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MEMCOD.2005.1487898     Document Type: Conference Paper
Times cited : (11)

References (23)
  • 1
    • 33745118120 scopus 로고    scopus 로고
    • [Abs04] Abslnt. aicall
    • [Abs04] Abslnt. aicall. http://www.aicall.de/, 2004.
    • (2004)
  • 4
    • 35048861896 scopus 로고    scopus 로고
    • A tool for checking ANSI-C programs
    • [CKL04]. In Kurt Jensen and Andreas Podelski, editors, TACAS. Springer
    • [CKL04] Edmund M. Clarke, Daniel Kroening, and Flavio Lerda. A tool for checking ANSI-C programs. In Kurt Jensen and Andreas Podelski, editors, TACAS, volume 2988 of Lecture Notes in Computer Science, pages 168-176. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2988 , pp. 168-176
    • Clarke, E.M.1    Kroening, D.2    Lerda, F.3
  • 5
    • 0043197065 scopus 로고    scopus 로고
    • Behavioral consistency of C and Verilog programs using bounded model checking
    • [CKY03], School of Computer Science, Carnegie Mellon University
    • [CKY03] E. Clarke, D. Kroening, and K. Yorav. Behavioral consistency of C and Verilog programs using bounded model checking. Technical Report CMUCS-03-126, School of Computer Science, Carnegie Mellon University, 2003.
    • (2003) Technical Report , vol.CMUCS-03-126
    • Clarke, E.1    Kroening, D.2    Yorav, K.3
  • 6
    • 0037271415 scopus 로고    scopus 로고
    • First-order verification of cryptographic protocols
    • [Coh03]
    • [Coh03] Ernie Cohen. First-order verification of cryptographic protocols. Journal of Computer Security, 11(2):189-216, 2003.
    • (2003) Journal of Computer Security , vol.11 , Issue.2 , pp. 189-216
    • Cohen, E.1
  • 8
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • [DY83]
    • [DY83] D. Dolev and A. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT-29(2):198-208, 1983.
    • (1983) IEEE Transactions on Information Theory , vol.IT-29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 9
    • 84958046566 scopus 로고    scopus 로고
    • Secure interoperation of secure distributed databases
    • [GRS99]. In Jeannette M. Wing, Jim Woodcock, and Jim Davies, editors, number 1708 in Lecture Notes in Computer Science, Springer-Verlag
    • [GRS99] Fred Gilham, Robert A. Riemenschneider, and Victoria Stavridou. Secure interoperation of secure distributed databases. In Jeannette M. Wing, Jim Woodcock, and Jim Davies, editors, World Congress on Formal Methods in the Development of Computing Systems (FM 99), number 1708 in Lecture Notes in Computer Science, pages 701-717. Springer-Verlag, 1999.
    • (1999) World Congress on Formal Methods in the Development of Computing Systems (FM 99) , pp. 701-717
    • Gilham, F.1    Riemenschneider, R.A.2    Stavridou, V.3
  • 10
    • 0035361164 scopus 로고    scopus 로고
    • Software model checking: Extracting verification models from source code
    • [HS01]
    • [HS01] G.J. Holzmann and M.H. Smith. Software model checking: extracting verification models from source code. Software Testing, Verification & Reliability, 11(2):65-79, 2001.
    • (2001) Software Testing, Verification & Reliability , vol.11 , Issue.2 , pp. 65-79
    • Holzmann, G.J.1    Smith, M.H.2
  • 11
    • 33646915332 scopus 로고    scopus 로고
    • Practical security analysis of C programs using automatic theorem provers
    • [JK04], Verisoft Project, December
    • [JK04] J. Jürjens and Thomas Kuhn. Practical security analysis of C programs using automatic theorem provers. Technical Report ITB 51, Verisoft Project, December 2004.
    • (2004) Technical Report , vol.ITB 51
    • Jürjens, J.1    Kuhn, T.2
  • 14
    • 33244457785 scopus 로고    scopus 로고
    • Sound methods and effective tools for model-based security engineering with UML
    • [Jür05]. IEEE Computer Society
    • [Jür05] J. Jürjens. Sound methods and effective tools for model-based security engineering with UML. In 27th International Conference on Software Engineering (ICSE 2005). IEEE Computer Society, 2005.
    • (2005) 27th International Conference on Software Engineering (ICSE 2005)
    • Jürjens, J.1
  • 16
    • 33745129539 scopus 로고    scopus 로고
    • [Lab04] RSA Labs. PKCS 11
    • [Lab04] RSA Labs. PKCS 11 http://www. rsasecurity.com/rsalabs/node.asp?id=2133, 2004.
    • (2004)
  • 17
    • 0002219322 scopus 로고    scopus 로고
    • An attack on a recursive authentication protocol
    • [RS98]
    • [RS98] P. Ryan and S. Schneider. An attack on a recursive authentication protocol. Information Processing Letters, 65:7-10, 1998.
    • (1998) Information Processing Letters , vol.65 , pp. 7-10
    • Ryan, P.1    Schneider, S.2
  • 18
    • 84957071248 scopus 로고    scopus 로고
    • Automatic verification of cryptographic protocols with SETHEO
    • [Sch97]. In W. McCune, editor, 14th International Conference on Automated Deduction (CADE-14),. Springer-Verlag
    • [Sch97] J. Schumann. Automatic verification of cryptographic protocols with SETHEO. In W. McCune, editor, 14th International Conference on Automated Deduction (CADE-14), volume 1249 of Lecture Notes in Computer Science, pages 87-100. Springer-Verlag, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1249 , pp. 87-100
    • Schumann, J.1
  • 19
    • 33745162711 scopus 로고    scopus 로고
    • Analyzing cryptographic protocols in a reactive framework
    • [Shy02]. In Agostino Cortesi, editor, VMCAI,. Springer
    • [Shy02] R. K. Shyamasundar. Analyzing cryptographic protocols in a reactive framework. In Agostino Cortesi, editor, VMCAI, volume 2294 of Lecture Notes in Computer Science, pages 46-64. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2294 , pp. 46-64
    • Shyamasundar, R.K.1
  • 21
    • 84891081669 scopus 로고    scopus 로고
    • A bound on attacks on authentication protocols
    • [Sto02]. In Ricardo A. Baeza-Yates, Ugo Montanari, and Nicola Santoro, editors, IFIP TCS. Kluwer
    • [Sto02] Scott D. Stoller. A bound on attacks on authentication protocols. In Ricardo A. Baeza-Yates, Ugo Montanari, and Nicola Santoro, editors, IFIP TCS, volume 223 of IFIP Conference Proceedings, pages 588-600. Kluwer, 2002.
    • (2002) IFIP Conference Proceedings , vol.223 , pp. 588-600
    • Stoller, S.D.1
  • 22
    • 84886043387 scopus 로고    scopus 로고
    • 3 theorem prover
    • [SW00]. In R. Dyckhoff, editor, Automated Reasoning with Analytic Tableaux and Related Methods (TABLEAUX 2000),. Springer-Verlag
    • 3 theorem prover. In R. Dyckhoff, editor, Automated Reasoning with Analytic Tableaux and Related Methods (TABLEAUX 2000), volume 1847 of Lecture Notes in Computer Science, pages 436-440. Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1847 , pp. 436-440
    • Stenz, G.1    Wolf, A.2
  • 23
    • 84957640213 scopus 로고    scopus 로고
    • Towards an automatic analysis of security protocols in first-order logic
    • [Wei99]. In H. Ganzinger, editor, 16th International Conference on Automated Deduction (CADE-16)
    • [Wei99] C. Weidenbach. Towards an automatic analysis of security protocols in first-order logic. In H. Ganzinger, editor, 16th International Conference on Automated Deduction (CADE-16), volume 1632 of Lecture Notes in Computer Science, pages 314-328, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1632 , pp. 314-328
    • Weidenbach, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.