메뉴 건너뛰기




Volumn , Issue , 2010, Pages 445-456

Modular verification of security protocol code by typing

Author keywords

F7; Refinement type

Indexed keywords

CODE VERIFICATION; COMPOSITIONAL VERIFICATION; CRYPTOGRAPHIC CODES; CRYPTOGRAPHIC PROTOCOLS; DOMAIN SPECIFIC; LOGIC MODELS; MODULAR VERIFICATION; PROTOCOL IMPLEMENTATION; SECURITY PROTOCOLS; TYPECHECKING; WHOLE-PROGRAM ANALYSIS;

EID: 77950909049     PISSN: 07308566     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1706299.1706350     Document Type: Conference Paper
Times cited : (93)

References (27)
  • 1
    • 0001772130 scopus 로고    scopus 로고
    • Secrecy by typing in security protocols
    • M. Abadi. Secrecy by typing in security protocols. JACM, 46(5):749-786, 1999.
    • (1999) JACM , vol.46 , Issue.5 , pp. 749-786
    • Abadi, M.1
  • 2
    • 51249085821 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. J. Cryptology, 21(4), 2008.
    • (2008) J. Cryptology , vol.21 , Issue.4
    • Bellare, M.1    Namprempre, C.2
  • 5
    • 33947683919 scopus 로고    scopus 로고
    • Verified interoperable implementations of security protocols
    • K. Bhargavan, C. Fournet, A. D. Gordon, and S. Tse. Verified interoperable implementations of security protocols. In CSFW'06, 2006b.
    • (2006) CSFW'06
    • Bhargavan, K.1    Fournet, C.2    Gordon, A.D.3    Tse, S.4
  • 6
    • 57849106656 scopus 로고    scopus 로고
    • Cryptographically verified implementations for TLS
    • K. Bhargavan, C. Fournet, R. Corin, and E. Zalinescu. Cryptographically verified implementations for TLS. In ACM CCS, pages 459-468, 2008a.
    • (2008) ACM CCS , pp. 459-468
    • Bhargavan, K.1    Fournet, C.2    Corin, R.3    Zalinescu, E.4
  • 7
    • 67649884132 scopus 로고    scopus 로고
    • Verified implementations of the Information Card federated identity-management protocol
    • K. Bhargavan, C. Fournet, A. D. Gordon, and N. Swamy. Verified implementations of the Information Card federated identity-management protocol. In ASIACCS'08, pages 123-135, 2008b.
    • (2008) ASIACCS'08 , pp. 123-135
    • Bhargavan, K.1    Fournet, C.2    Gordon, A.D.3    Swamy, N.4
  • 8
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on Prolog rules
    • B. Blanchet. An efficient cryptographic protocol verifier based on Prolog rules. In CSFW'01, pages 82-96, 2001.
    • (2001) CSFW'01 , pp. 82-96
    • Blanchet, B.1
  • 11
    • 70350543796 scopus 로고    scopus 로고
    • ASPIER: An automated framework for verifying security protocol implementations
    • S. Chaki and A. Datta. ASPIER: An automated framework for verifying security protocol implementations. In CSF'09, 2009.
    • (2009) CSF'09
    • Chaki, S.1    Datta, A.2
  • 12
  • 13
    • 45749085681 scopus 로고    scopus 로고
    • Z3: An efficient SMT solver
    • Springer, LNCS 4963
    • L. de Moura and N. Bjørner. Z3: An efficient SMT solver. In TACAS'08, pages 337-340. Springer, 2008. LNCS 4963.
    • (2008) TACAS'08 , pp. 337-340
    • De Moura, L.1    Bjørner, N.2
  • 14
  • 15
    • 33745822823 scopus 로고    scopus 로고
    • Hybrid type checking
    • C. Flanagan. Hybrid type checking. In ACM POPL'06, pages 245-256, 2006.
    • (2006) ACM POPL'06 , pp. 245-256
    • Flanagan, C.1
  • 16
    • 0141863341 scopus 로고    scopus 로고
    • Authenticity by typing for security protocols
    • A. D. Gordon and A. S. A. Jeffrey. Authenticity by typing for security protocols. J. Computer Security, 11(4):451-521, 2003a.
    • (2003) J. Computer Security , vol.11 , Issue.4 , pp. 451-521
    • Gordon, A.D.1    Jeffrey, A.S.A.2
  • 17
    • 3042660681 scopus 로고    scopus 로고
    • Types and effects for asymmetric cryptographic protocols
    • A. D. Gordon and A. S. A. Jeffrey. Types and effects for asymmetric cryptographic protocols. J. Computer Security, 12(3/4):435-484, 2003b.
    • (2003) J. Computer Security , vol.12 , Issue.3-4 , pp. 435-484
    • Gordon, A.D.1    Jeffrey, A.S.A.2
  • 18
    • 24144470036 scopus 로고    scopus 로고
    • Cryptographic protocol analysis on real C code
    • J. Goubault-Larrecq and F. Parrennes. Cryptographic protocol analysis on real C code. In VMCAI'05, pages 363-379, 2005.
    • (2005) VMCAI'05, Pages , pp. 363-379
    • Goubault-Larrecq, J.1    Parrennes, F.2
  • 20
    • 33845203832 scopus 로고    scopus 로고
    • On the relationship between web services security and traditional protocols
    • E. Kleiner and A. W. Roscoe. On the relationship between web services security and traditional protocols. In MFPS XXI, 2005.
    • (2005) MFPS , vol.21
    • Kleiner, E.1    Roscoe, A.W.2
  • 21
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • LNCS 1055
    • G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In TACAS, pages 147-166, 1996. LNCS 1055.
    • (1996) TACAS , pp. 147-166
    • Lowe, G.1
  • 22
    • 0015561577 scopus 로고
    • Protection in programming languages
    • J. H. Morris, Jr. Protection in programming languages. Commun. ACM, 16 (1):15-21, 1973.
    • (1973) Commun. ACM , vol.16 , Issue.1 , pp. 15-21
    • Morris Jr., J.H.1
  • 23
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Commun. ACM, 21(12):993-999, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 24
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. Paulson. The inductive approach to verifying cryptographic protocols. J. Computer Security, 6:85-128, 1998.
    • (1998) J. Computer Security , vol.6 , pp. 85-128
    • Paulson, L.1
  • 25
    • 77149165015 scopus 로고    scopus 로고
    • Cambridge University lecture notes
    • L. C. Paulson. Logic and proof. Cambridge University lecture notes, 2008.
    • (2008) Logic and Proof
    • Paulson, L.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.