메뉴 건너뛰기




Volumn , Issue , 2006, Pages 167-176

Security analysis of crypto-based Java programs using automated theorem provers

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATED THEOREM PROVERS; CRYPTO-BASED JAVA PROGRAMS; SECURITY ANALYSIS;

EID: 34547455692     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ASE.2006.60     Document Type: Conference Paper
Times cited : (40)

References (23)
  • 1
    • 26444497860 scopus 로고    scopus 로고
    • The AVISPA tool for the automated validation of internet security protocols and applications
    • CAV2005, of, Springer
    • A. Armando and D.A. Basin et al. The AVISPA tool for the automated validation of internet security protocols and applications. In CAV2005, volume 3576 of LNCS, pages 281-285. Springer, 2005.
    • (2005) LNCS , vol.3576 , pp. 281-285
    • Armando, A.1    Basin, D.A.2
  • 6
    • 34547416324 scopus 로고    scopus 로고
    • CEPSCO. Common Electronic Purse Specifications, 2001. Business Requirements Version 7.0, Functional Requirements Version 6.3, Technical Specification Version 2.3, available from http://www.cepsco.com.
    • CEPSCO. Common Electronic Purse Specifications, 2001. Business Requirements Version 7.0, Functional Requirements Version 6.3, Technical Specification Version 2.3, available from http://www.cepsco.com.
  • 7
    • 0007434664 scopus 로고
    • Program proving: Coroutines
    • M. Clint. Program proving: Coroutines. Acta Informatica, 2:53-60, 1973.
    • (1973) Acta Informatica , vol.2 , pp. 53-60
    • Clint, M.1
  • 8
    • 0037271415 scopus 로고    scopus 로고
    • First-order verification of cryptographic protocols
    • E. Cohen. First-order verification of cryptographic protocols. Journal of Computer Security, 11 (2):189-216, 2003.
    • (2003) Journal of Computer Security , vol.11 , Issue.2 , pp. 189-216
    • Cohen, E.1
  • 9
  • 10
    • 0035361164 scopus 로고    scopus 로고
    • Software model checking: Extracting verification models from source code
    • G.J. Holzmann and M.H. Smith. Software model checking: extracting verification models from source code. Software Testing, Verification & Reliability, 11(2):65-79, 2001.
    • (2001) Software Testing, Verification & Reliability , vol.11 , Issue.2 , pp. 65-79
    • Holzmann, G.J.1    Smith, M.H.2
  • 11
    • 84947269249 scopus 로고    scopus 로고
    • Secure information flow as typed process behaviour
    • G. Smolka, editor, ESOP2000, of, Springer
    • K. Honda, V.T. Vasconcelos, and N. Yoshida. Secure information flow as typed process behaviour. In G. Smolka, editor, ESOP2000, volume 1782 of LNCS, pages 180-199. Springer, 2000.
    • (2000) LNCS , vol.1782 , pp. 180-199
    • Honda, K.1    Vasconcelos, V.T.2    Yoshida, N.3
  • 12
    • 84858101532 scopus 로고    scopus 로고
    • JavaSectool. http://www4.in.tum.de/~javasec.
    • JavaSectool
  • 13
    • 84858083916 scopus 로고    scopus 로고
    • http://java.sun.com/products/javacard/index.jsp.
  • 16
    • 84885216103 scopus 로고    scopus 로고
    • Secure information flow for concurrent processes
    • CONCUR 2000, of, Springer
    • J. Jurjens. Secure information flow for concurrent processes. In CONCUR 2000, volume 1877 of LNCS, pages 395-409. Springer, 2000.
    • (2000) LNCS , vol.1877 , pp. 395-409
    • Jurjens, J.1
  • 18
    • 33244457785 scopus 로고    scopus 로고
    • Sound methods and effective tools for model-based security engineering with UML
    • IEEE
    • J. Jürjens. Sound methods and effective tools for model-based security engineering with UML. In ICSE 2005. IEEE, 2005.
    • (2005) ICSE 2005
    • Jürjens, J.1
  • 19
    • 34547453511 scopus 로고    scopus 로고
    • Code security analysis with assertions
    • ACM
    • J. Jürjens and M. Yampolskiy. Code security analysis with assertions. In ASE 2005, pages 392-395. ACM, 2005.
    • (2005) ASE 2005 , pp. 392-395
    • Jürjens, J.1    Yampolskiy, M.2
  • 21
    • 84957071248 scopus 로고    scopus 로고
    • Automatic verification of cryptographic protocols with SETHEO
    • CADE-14, of, Springer
    • J. Schumann. Automatic verification of cryptographic protocols with SETHEO. In CADE-14, volume 1249 of LNCS, pages 87-100. Springer, 1997.
    • (1997) LNCS , vol.1249 , pp. 87-100
    • Schumann, J.1
  • 22
    • 84886043387 scopus 로고    scopus 로고
    • 3 theorem prover
    • TABLEAUX 2000, of, Springer
    • 3 theorem prover. In TABLEAUX 2000, volume 1847 of LNCS, pages 436-440. Springer, 2000.
    • (2000) LNCS , vol.1847 , pp. 436-440
    • Stenz, G.1    Wolf, A.2
  • 23
    • 84957640213 scopus 로고    scopus 로고
    • Towards an automatic analysis of security protocols in first-order logic
    • 1632 of
    • C. Weidenbach. Towards an automatic analysis of security protocols in first-order logic. In CADE-16, volume 1632 of LNCS, pages 314-328, 1999.
    • (1999) LNCS , vol.CADE-16 , pp. 314-328
    • Weidenbach, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.