메뉴 건너뛰기




Volumn , Issue , 2010, Pages 231-245

Strong invariants for the efficient construction of machine-checked protocol security proofs

Author keywords

Automatic tools; Formal methods; Security protocols; Theorem proving

Indexed keywords

AUTOMATIC PROOFS; AUTOMATIC TOOLS; CORRECTNESS PROOFS; EFFICIENT CONSTRUCTION; HUMAN-READABLE; INTERACTIVE THEOREM PROVER; ISABELLE/HOL; OPERATIONAL SEMANTICS; PROTOCOL SECURITY; SECURITY PROTOCOLS;

EID: 77957568200     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2010.23     Document Type: Conference Paper
Times cited : (24)

References (37)
  • 1
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L. C. Paulson, "The inductive approach to verifying cryptographic protocols, " Journal of Computer Security, vol. 6, pp. 85-128, 1998.
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 3
    • 85024252307 scopus 로고    scopus 로고
    • Inductive analysis of the internet protocol TLS
    • L. C. Paulson, "Inductive analysis of the internet protocol TLS, " ACM Trans. Inf. Syst. Secur., vol. 2, no. 3, pp. 332- 351, 1999.
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.3 , pp. 332-351
    • Paulson, L.C.1
  • 4
    • 22444455879 scopus 로고    scopus 로고
    • Kerberos version 4: Inductive analysis of the secrecy goals
    • ser. Lecture Notes in Computer Science, J.-J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, Eds., Springer
    • G. Bella and L. C. Paulson, "Kerberos version 4: Inductive analysis of the secrecy goals, " in ESORICS, ser. Lecture Notes in Computer Science, J.-J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, Eds., vol. 1485. Springer, 1998, pp. 361-375.
    • (1998) ESORICS , vol.1485 , pp. 361-375
    • Bella, G.1    Paulson, L.C.2
  • 6
    • 0035072287 scopus 로고    scopus 로고
    • Athena: A novel approach to efficient automatic security protocol analysis
    • D. Song, S. Berezin, and A. Perrig, "Athena: A novel approach to efficient automatic security protocol analysis, " Journal of Computer Security, vol. 9, pp. 47-74, 2001.
    • (2001) Journal of Computer Security , vol.9 , pp. 47-74
    • Song, D.1    Berezin, S.2    Perrig, A.3
  • 7
    • 68249091950 scopus 로고    scopus 로고
    • Automatic verification of correspondences for security protocols
    • B. Blanchet, "Automatic verification of correspondences for security protocols, " Journal of Computer Security, vol. 17, no. 4, pp. 363-434, 2009.
    • (2009) Journal of Computer Security , vol.17 , Issue.4 , pp. 363-434
    • Blanchet, B.1
  • 8
    • 67650240831 scopus 로고    scopus 로고
    • Unbounded verification, falsification, and characterization of security protocols by pattern refinement
    • New York, NY, USA: ACM
    • C. Cremers, "Unbounded verification, falsification, and characterization of security protocols by pattern refinement, " in CCS '08: Proceedings of the 15th ACM conference on Computer and communications security. New York, NY, USA: ACM, 2008, pp. 119-128.
    • (2008) CCS '08: Proceedings of the 15th ACM Conference on Computer and Communications Security , pp. 119-128
    • Cremers, C.1
  • 13
    • 51749115322 scopus 로고    scopus 로고
    • Towards producing formally checkable security proofs, automatically
    • IEEE Computer Society
    • J. Goubault-Larrecq, "Towards producing formally checkable security proofs, automatically, " in CSF. IEEE Computer Society, 2008, pp. 224-238.
    • (2008) CSF , pp. 224-238
    • Goubault-Larrecq, J.1
  • 15
    • 0030708255 scopus 로고    scopus 로고
    • A hierarchy of authentication specifications
    • IEEE Computer Society
    • G. Lowe, "A hierarchy of authentication specifications, " in CSFW. IEEE Computer Society, 1997, pp. 31-44.
    • (1997) CSFW , pp. 31-44
    • Lowe, G.1
  • 16
    • 33750487822 scopus 로고    scopus 로고
    • Injective synchronisation: An extension of the authentication hierarchy
    • C. Cremers, S. Mauw, and E. de Vink, "Injective synchronisation: An extension of the authentication hierarchy, " Theor. Comput. Sci., vol. 367, pp. 139-161, 2006.
    • (2006) Theor. Comput. Sci. , vol.367 , pp. 139-161
    • Cremers, C.1    Mauw, S.2    Vink, E.D.3
  • 18
    • 0033683193 scopus 로고    scopus 로고
    • How to prevent type flaw attacks on security protocols
    • J. Heather, G. Lowe, and S. Schneider, "How to prevent type flaw attacks on security protocols, " in CSFW, 2000, pp. 255- 268.
    • (2000) CSFW , pp. 255-268
    • Heather, J.1    Lowe, G.2    Schneider, S.3
  • 19
    • 12744277366 scopus 로고    scopus 로고
    • On preventing type flaw attacks on security protocols with a simplified tagging scheme
    • Y. Li, W. Yang, and C.-W. Huang, "On preventing type flaw attacks on security protocols with a simplified tagging scheme, " J. Inf. Sci. Eng., vol. 21, no. 1, pp. 59-84, 2005.
    • (2005) J. Inf. Sci. Eng. , vol.21 , Issue.1 , pp. 59-84
    • Li, Y.1    Yang, W.2    Huang, C.-W.3
  • 20
    • 38349010575 scopus 로고    scopus 로고
    • Bounding messages for free in security protocols
    • ser. Lecture Notes in Computer Science, V. Arvind and S. Prasad, Eds., Springer
    • M. Arapinis and M. Duflot, "Bounding messages for free in security protocols, " in FSTTCS, ser. Lecture Notes in Computer Science, V. Arvind and S. Prasad, Eds., vol. 4855. Springer, 2007, pp. 376-387.
    • (2007) FSTTCS , vol.4855 , pp. 376-387
    • Arapinis, M.1    Duflot, M.2
  • 22
    • 57049134167 scopus 로고    scopus 로고
    • The Isabelle framework
    • ser. Lecture Notes in Computer Science, O. A. Mohamed, C. Muñoz, and S. Tahar, Eds., Springer
    • M. Wenzel, L. C. Paulson, and T. Nipkow, "The Isabelle framework, " in TPHOLs, ser. Lecture Notes in Computer Science, O. A. Mohamed, C. Muñoz, and S. Tahar, Eds., vol. 5170. Springer, 2008, pp. 33-38.
    • (2008) TPHOLs , vol.5170 , pp. 33-38
    • Wenzel, M.1    Paulson, L.C.2    Nipkow, T.3
  • 24
    • 0034950756 scopus 로고    scopus 로고
    • Relations between secrets: Two formal analyses of the Yahalom protocol
    • L. C. Paulson, "Relations between secrets: Two formal analyses of the Yahalom protocol, " Journal of Computer Security, vol. 9, no. 3, pp. 197-216, 2001.
    • (2001) Journal of Computer Security , vol.9 , Issue.3 , pp. 197-216
    • Paulson, L.C.1
  • 26
    • 15744388991 scopus 로고    scopus 로고
    • Tree automata with one memory set constraints and cryptographic protocols
    • H. Comon and V. Cortier, "Tree automata with one memory set constraints and cryptographic protocols, " Theor. Comput. Sci., vol. 331, no. 1, pp. 143-214, 2005.
    • (2005) Theor. Comput. Sci. , vol.331 , Issue.1 , pp. 143-214
    • Comon, H.1    Cortier, V.2
  • 27
    • 84874348708 scopus 로고    scopus 로고
    • An Isabelle formalization of protocolindependent secrecy with an application to e-commerce
    • vol. abs/cs/0610069
    • F. Blanqui, "An Isabelle formalization of protocolindependent secrecy with an application to e-commerce, " CoRR, vol. abs/cs/0610069, 2006.
    • (2006) CoRR
    • Blanqui, F.1
  • 28
    • 20144370847 scopus 로고    scopus 로고
    • Verifying security protocols with PVS: Widening the rank function approach
    • N. Evans and S. A. Schneider, "Verifying security protocols with PVS: widening the rank function approach, " J. Log. Algebr. Program., vol. 64, no. 2, pp. 253-284, 2005.
    • (2005) J. Log. Algebr. Program. , vol.64 , Issue.2 , pp. 253-284
    • Evans, N.1    Schneider, S.A.2
  • 29
    • 0030684956 scopus 로고    scopus 로고
    • Verifying authentication protocols with CSP
    • S. Schneider, "Verifying authentication protocols with CSP, " in CSFW, 1997, pp. 3-17.
    • (1997) CSFW , pp. 3-17
    • Schneider, S.1
  • 30
    • 71749089654 scopus 로고    scopus 로고
    • Semantics and logic for security protocols
    • B. Jacobs and I. Hasuo, "Semantics and logic for security protocols, " J. Comput. Secur., no. 6, pp. 909-944, 2009.
    • (2009) J. Comput. Secur. , vol.6 , pp. 909-944
    • Jacobs, B.1    Hasuo, I.2
  • 32
    • 3042563843 scopus 로고    scopus 로고
    • Authentication tests and disjoint encryption: A design method for security protocols
    • J. D. Guttman, "Authentication tests and disjoint encryption: A design method for security protocols, " Journal of Computer Security, vol. 12, pp. 409-433, 2004.
    • (2004) Journal of Computer Security , vol.12 , pp. 409-433
    • Guttman, J.D.1
  • 34
    • 70349335930 scopus 로고    scopus 로고
    • The open-source fixed-point model checker for symbolic analysis of security protocols
    • ser. Lecture Notes in Computer Science, A. Aldini, G. Barthe, and R. Gorrieri, Eds., Springer
    • S. Mödersheim and L. Viganò, "The Open-source Fixed-point Model Checker for symbolic analysis of security protocols, " in FOSAD, ser. Lecture Notes in Computer Science, A. Aldini, G. Barthe, and R. Gorrieri, Eds., vol. 5705. Springer, 2009, pp. 166-194.
    • (2009) FOSAD , vol.5705 , pp. 166-194
    • Mödersheim, S.1    Viganó, L.2
  • 36
    • 77957596263 scopus 로고    scopus 로고
    • How to evaluate the security of real-life cryptographic protocols? the cases of ISO/IEC 29128 and CRYPTREC
    • to appear
    • S. Matsuo, K. Miyazaki, A. Otsuka, and D. Basin, "How to evaluate the security of real-life cryptographic protocols? the cases of ISO/IEC 29128 and CRYPTREC, " in Financial Cryptography, 2010, to appear.
    • (2010) Financial Cryptography
    • Matsuo, S.1    Miyazaki, K.2    Otsuka, A.3    Basin, D.4
  • 37
    • 35048899619 scopus 로고    scopus 로고
    • Searching for shapes in cryptographic protocols
    • ser. Lecture Notes in Computer Science, O. Grumberg and M. Huth, Eds., Springer
    • S. F. Doghmi, J. D. Guttman, and F. J. Thayer, "Searching for shapes in cryptographic protocols, " in TACAS, ser. Lecture Notes in Computer Science, O. Grumberg and M. Huth, Eds., vol. 4424. Springer, 2007, pp. 523-537.
    • (2007) TACAS , vol.4424 , pp. 523-537
    • Doghmi, S.F.1    Guttman, J.D.2    Thayer, F.J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.