메뉴 건너뛰기




Volumn , Issue , 2010, Pages 387-398

Computationally sound verification of source code

Author keywords

Computational soundness; Source code; Verification

Indexed keywords

AUTOMATED VERIFICATION; COMPUTATIONAL SECURITY; COMPUTATIONAL SOUNDNESS; CRYPTOGRAPHIC ALGORITHMS; CRYPTOGRAPHIC PRIMITIVES; CRYPTOGRAPHIC PROTOCOLS; CRYPTOGRAPHIC SECURITY; FORMAL VERIFICATIONS; LAMBDA CALCULUS; MATHEMATICAL PROPERTIES; PROTOCOL ANALYSIS; PROTOCOL IMPLEMENTATION; PUBLIC-KEY ENCRYPTION; SOUND VERIFICATION; SOURCE CODES; VERIFICATION FRAMEWORK;

EID: 78650000256     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1866307.1866351     Document Type: Conference Paper
Times cited : (40)

References (41)
  • 1
    • 33745790245 scopus 로고    scopus 로고
    • Guessing attacks and the computational soundness of static equivalence
    • Proc. 9th International Conference on Foundations of Software Science and ComputationStructures (FOSSACS). Springer
    • M. Abadi, M. Baudet, and B. Warinschi. Guessing attacks and the computational soundness of static equivalence. In Proc. 9th International Conference on Foundations of Software Science and ComputationStructures (FOSSACS), volume 3921 of Lecture Notes in Computer Science, pages 398-412. Springer, 2006.
    • (2006) Lecture Notes in Computer Science , vol.3921 , pp. 398-412
    • Abadi, M.1    Baudet, M.2    Warinschi, B.3
  • 5
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • Martín Abadi and Phillip Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology, 15(2):103-127, 2002.
    • (2002) Journal of Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 6
    • 33746364838 scopus 로고    scopus 로고
    • Cryptographically sound implementations for communicating processes
    • Pedro Adão and Cédric Fournet. Cryptographically sound implementations for communicating processes. In Proc. ICALP, pages 83-94, 2006.
    • (2006) Proc. ICALP , pp. 83-94
    • Adão, P.1    Fournet, C.2
  • 7
    • 74049100112 scopus 로고    scopus 로고
    • CoSP: A general framework for computational soundness proofs
    • ACM Press, November 2009. Full version on IACR ePrint 2009/080. Some of the definitions we use only occur in the full version
    • Michael Backes, Dennis Hofheinz, and Dominique Unruh. CoSP: A general framework for computational soundness proofs. In ACM CCS 2009, pages 66-78. ACM Press, November 2009. Full version on IACR ePrint 2009/080. Some of the definitions we use only occur in the full version.
    • (2009) ACM CCS , pp. 66-78
    • Backes, M.1    Hofheinz, D.2    Unruh, D.3
  • 11
    • 1442292329 scopus 로고    scopus 로고
    • A composable cryptographic library with nested operations (extended abstract)
    • Full version in IACR Cryptology ePrint Archive 2003/015, Jan. 2003
    • Michael Backes, Birgit Pfitzmann, and Michael Waidner. A composable cryptographic library with nested operations (extended abstract). In Proc. 10th ACM Conference on Computer and Communications Security, pages 220-230, 2003. Full version in IACR Cryptology ePrint Archive 2003/015, Jan. 2003.
    • (2003) Proc. 10th ACM Conference on Computer and Communications Security , pp. 220-230
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 12
    • 0142250274 scopus 로고    scopus 로고
    • Symmetric authentication within a simulatable cryptographic library
    • Proc. 8th European Symposium on Research in Computer Security (ESORICS). Springer
    • Michael Backes, Birgit Pfitzmann, and Michael Waidner. Symmetric authentication within a simulatable cryptographic library. In Proc. 8th European Symposium on Research in Computer Security (ESORICS), volume 2808 of Lecture Notes in Computer Science, pages 271-290. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2808 , pp. 271-290
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 13
    • 84855205195 scopus 로고    scopus 로고
    • The reactive simulatability (RSIM) framework for asynchronous systems
    • Michael Backes, Birgit Pfitzmann, and Michael Waidner. The reactive simulatability (RSIM) framework for asynchronous systems. Information and Computation, 205(12):1685-1720, 2007.
    • (2007) Information and Computation , vol.205 , Issue.12 , pp. 1685-1720
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 15
    • 26444541858 scopus 로고    scopus 로고
    • Computationally sound implementations of equational theories against passive adversaries
    • Proc. 32nd International Colloquium on Automata, Languages and Programming (ICALP). Springer
    • M. Baudet, V. Cortier, and S. Kremer. Computationally sound implementations of equational theories against passive adversaries. In Proc. 32nd International Colloquium on Automata, Languages and Programming (ICALP), volume 580 of Lecture Notes in Computer Science, pages 652-663. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.580 , pp. 652-663
    • Baudet, M.1    Cortier, V.2    Kremer, S.3
  • 20
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on Prolog rules
    • IEEE Computer Society Press
    • B. Blanchet. An efficient cryptographic protocol verifier based on Prolog rules. In Proc. 14th IEEE Computer Security Foundations Workshop (CSFW), pages 82-96. IEEE Computer Society Press, 2001.
    • (2001) Proc. 14th IEEE Computer Security Foundations Workshop (CSFW) , pp. 82-96
    • Blanchet, B.1
  • 21
    • 33751067991 scopus 로고    scopus 로고
    • A computationally sound mechanized prover for security protocols
    • IEEE Computer Society. Extended version online available as IACR ePrint 2005/401
    • Bruno Blanchet. A computationally sound mechanized prover for security protocols. In IEEE Symposium on Security and Privacy, Proceedings of SSP 2006, pages 140-154. IEEE Computer Society, 2006. Extended version online available as IACR ePrint 2005/401.
    • (2006) IEEE Symposium on Security and Privacy, Proceedings of SSP 2006 , pp. 140-154
    • Blanchet, B.1
  • 22
  • 23
    • 78650013074 scopus 로고    scopus 로고
    • About models of securityprotocols (abstract)
    • Ramesh Hariharan, Madhavan Mukund, and V Vinay, editors, Dagstuhl, Germany. Schloss Dagstuhl.
    • Hubert Comon-Lundh. About models of securityprotocols (abstract). In Ramesh Hariharan, Madhavan Mukund, and V Vinay, editors, Proc. FSTTCS, Dagstuhl, Germany, 2008. Schloss Dagstuhl. http://drops.dagstuhl.de/opus/volltexte/2008/ 1766/.
    • (2008) Proc. FSTTCS
    • Comon-Lundh, H.1
  • 24
    • 60549110127 scopus 로고    scopus 로고
    • Computational soundness of observational equivalence
    • Hubert Comon-Lundh and Véronique Cortier. Computational soundness of observational equivalence. In Proc. ACM CCS, pages 109-118, 2008.
    • (2008) Proc. ACM CCS , pp. 109-118
    • Comon-Lundh, H.1    Cortier, V.2
  • 26
    • 0020889144 scopus 로고
    • On the security of multi-party ping-pong protocols
    • Shimon Even and Oded Goldreich. On the security of multi-party ping-pong protocols. In Proc. 24th IEEE FOCS, pages 34-39, 1983.
    • (1983) Proc. 24th IEEE FOCS , pp. 34-39
    • Even, S.1    Goldreich, O.2
  • 28
    • 24144470036 scopus 로고    scopus 로고
    • Cryptographic protocol analysis on real c code
    • Proc. 6th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'05). Springer-Verlag
    • J. Goubault-Larrecq and F. Parrennes. Cryptographic protocol analysis on real c code. In Proc. 6th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'05), volume 3385 of Lecture Notes in Computer Science, pages 363-379. Springer-Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3385 , pp. 363-379
    • Goubault-Larrecq, J.1    Parrennes, F.2
  • 31
    • 35248848005 scopus 로고    scopus 로고
    • Plaintext awareness via key registration
    • Advances in Cryptology: CRYPTO 2003. Springer
    • Jonathan Herzog, Moses Liskov, and Silvio Micali. Plaintext awareness via key registration. In Advances in Cryptology: CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, pages 548-564. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2729 , pp. 548-564
    • Herzog, J.1    Liskov, M.2    Micali, S.3
  • 32
    • 24644476184 scopus 로고    scopus 로고
    • Completing the picture: Soundness of formal encryption in the presence of active adversaries
    • Romain Janvier, Yassine Lakhnech, and Laurent Mazaré. Completing the picture: Soundness of formal encryption in the presence of active adversaries. In Proc. ESOP, pages 172-185, 2005.
    • (2005) Proc. ESOP , pp. 172-185
    • Janvier, R.1    Lakhnech, Y.2    Mazaré, L.3
  • 33
    • 0028385109 scopus 로고
    • Three systems for cryptographic protocol analysis
    • Richard Kemmerer, Catherine Meadows, and Jon Millen. Three systems for cryptographic protocol analysis. Journal of Cryptology, 7(2):79-130, 1994.
    • (1994) Journal of Cryptology , vol.7 , Issue.2 , pp. 79-130
    • Kemmerer, R.1    Meadows, C.2    Millen, J.3
  • 34
    • 84945249768 scopus 로고    scopus 로고
    • Semantics and program analysis of computationally secure information flow
    • Peeter Laud. Semantics and program analysis of computationally secure information flow. In Proc. 10th European Symposium on Programming (ESOP), pages 77-91, 2001.
    • (2001) Proc. 10th European Symposium on Programming (ESOP) , pp. 77-91
    • Laud, P.1
  • 35
    • 3543052976 scopus 로고    scopus 로고
    • Symmetric encryption in automatic analyses for confidentiality against active adversaries
    • Peeter Laud. Symmetric encryption in automatic analyses for confidentiality against active adversaries. In Proc. 25th IEEE Symposium on Security & Privacy, pages 71-85, 2004.
    • (2004) Proc. 25th IEEE Symposium on Security & Privacy , pp. 71-85
    • Laud, P.1
  • 36
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder public-key protocol using FDR
    • Proc. 2nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS). Springer
    • Gavin Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Proc. 2nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), volume 1055 of Lecture Notes in Computer Science, pages 147-166. Springer, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1055 , pp. 147-166
    • Lowe, G.1
  • 37
    • 0004256761 scopus 로고
    • PhD thesis, Georgia Institute of Technology
    • Michael Merritt. Cryptographic Protocols. PhD thesis, Georgia Institute of Technology, 1983.
    • (1983) Cryptographic Protocols
    • Merritt, M.1
  • 38
    • 35048899313 scopus 로고    scopus 로고
    • Soundness of formal encryption in the presence of active adversaries
    • Proc. 1st Theory of Cryptography Conference (TCC). Springer
    • Daniele Micciancio and Bogdan Warinschi. Soundness of formal encryption in the presence of active adversaries. In Proc. 1st Theory of Cryptography Conference (TCC), volume 2951 of Lecture Notes in Computer Science, pages 133-151. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2951 , pp. 133-151
    • Micciancio, D.1    Warinschi, B.2
  • 39
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Lawrence Paulson. The inductive approach to verifying cryptographic protocols. Journal of Cryptology, 6(1):85-128, 1998.
    • (1998) Journal of Cryptology , vol.6 , Issue.1 , pp. 85-128
    • Paulson, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.