메뉴 건너뛰기




Volumn , Issue , 2011, Pages 3-17

Guiding a general-purpose C verifier to prove cryptographic protocols

Author keywords

[No Author keywords available]

Indexed keywords

C (PROGRAMMING LANGUAGE); THEOREM PROVING;

EID: 80052648343     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2011.8     Document Type: Conference Paper
Times cited : (32)

References (41)
  • 1
    • 0002885224 scopus 로고    scopus 로고
    • Prudent engineering practice for cryptographie protocols
    • M. Abadi and R. M. Needham, "Prudent engineering practice for cryptographic protocols," IEEE Trans. Software Eng., vol. 22, no. 1, pp. 6-15, 1996. (Pubitemid 126771654)
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 6-15
    • Abadi, M.1    Needham, R.2
  • 3
    • 79953220810 scopus 로고    scopus 로고
    • Verified software toolchain
    • ESOP, ser.
    • A. W. Appel, "Verified software toolchain," in ESOP, ser. LNCS, vol. 6602, 2011, pp. 1-17.
    • (2011) LNCS , vol.6602 , pp. 1-17
    • Appel, A.W.1
  • 4
    • 80052649937 scopus 로고    scopus 로고
    • Union and intersection types for secure protocol implementations
    • M. Backes, C. Hriţcu, and M. Maffei, "Union and intersection types for secure protocol implementations," in TOSCA, 2011.
    • (2011) TOSCA
    • Backes, M.1    Hriţcu, C.2    Maffei, M.3
  • 5
    • 78650000256 scopus 로고    scopus 로고
    • Computationally sound verification of source code
    • M. Backes, M. Maffei, and D. Unruh, "Computationally sound verification of source code," in ACM CCS, 2010, pp. 387-398.
    • (2010) ACM CCS , pp. 387-398
    • Backes, M.1    Maffei, M.2    Unruh, D.3
  • 6
    • 1442292329 scopus 로고    scopus 로고
    • A composable cryptographic library with nested operations
    • M. Backes, B. Pfitzmann, and M. Waidner, "A composable cryptographic library with nested operations," in ACM CCS, 2003, pp. 220-230.
    • (2003) ACM CCS , pp. 220-230
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 8
    • 67649846626 scopus 로고    scopus 로고
    • Formal certification of code-based cryptographic proofs
    • G. Barthe, B. Grégoire, and S. Z. Béguelin, "Formal certification of code-based cryptographic proofs," in POPL, 2009, pp. 90-101.
    • (2009) POPL , pp. 90-101
    • Barthe, G.1    Grégoire, B.2    Béguelin, S.Z.3
  • 10
    • 57849126802 scopus 로고    scopus 로고
    • Verified interoperable implementations of security protocols
    • December
    • K. Bhargavan, C. Fournet, A. D. Gordon, and S. Tse, "Verified interoperable implementations of security protocols," ACM TOPLAS, vol. 31, pp. 5:1-5:61, December 2008.
    • (2008) ACM TOPLAS , vol.31
    • Bhargavan, K.1    Fournet, C.2    Gordon, A.D.3    Tse, S.4
  • 11
    • 57849106656 scopus 로고    scopus 로고
    • Cryptographically verified implementations for tls
    • K. Bhargavan, C. Fournet, R. Corin, and E. Zalinescu, "Cryptographically verified implementations for tls," in ACM CCS, 2008, pp. 459-468.
    • (2008) ACM CCS , pp. 459-468
    • Bhargavan, K.1    Fournet, C.2    Corin, R.3    Zalinescu, E.4
  • 12
    • 77950909049 scopus 로고    scopus 로고
    • Modular verification of security protocol code by typing
    • K. Bhargavan, C. Fournet, and A. D. Gordon, "Modular verification of security protocol code by typing," in POPL, 2010, pp. 445-456.
    • (2010) POPL , pp. 445-456
    • Bhargavan, K.1    Fournet, C.2    Gordon, A.D.3
  • 13
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on prolog rules
    • B. Blanchet, "An efficient cryptographic protocol verifier based on prolog rules," in CSFW, 2001, pp. 82-96.
    • (2001) CSFW , pp. 82-96
    • Blanchet, B.1
  • 14
    • 33751067991 scopus 로고    scopus 로고
    • A computationally sound mechanized prover for security protocols
    • -, "A computationally sound mechanized prover for security protocols," in IEEE Symposium on Security and Privacy, 2006, pp. 140-154.
    • IEEE Symposium on Security and Privacy, 2006 , pp. 140-154
  • 15
    • 49949119291 scopus 로고    scopus 로고
    • Breaking and fixing public-key Kerberos
    • ASIAN, ser.
    • I. Cervesato, A. D. Jaggard, A. Scedrov, J.-K. Tsay, and C. Walstad, "Breaking and fixing public-key Kerberos," in ASIAN, ser. LNCS, vol. 4435, 2006, pp. 167-181.
    • (2006) LNCS , vol.4435 , pp. 167-181
    • Cervesato, I.1    Jaggard, A.D.2    Scedrov, A.3    Tsay, J.-K.4    Walstad, C.5
  • 17
    • 0037271415 scopus 로고    scopus 로고
    • First-order verification of cryptographic protocols
    • E. Cohen, "First-order verification of cryptographic protocols,"Journal of Computer Security, vol. 11, no. 2, pp. 189-216, 2003.
    • (2003) Journal of Computer Security , vol.11 , Issue.2 , pp. 189-216
    • Cohen, E.1
  • 19
    • 77954963599 scopus 로고    scopus 로고
    • Local verification of global invariants in concurrent programs
    • CAV, ser.
    • E. Cohen, M. Moskal, W. Schulte, and S. Tobies, "Local verification of global invariants in concurrent programs," in CAV, ser. LNCS, vol. 6174, 2010, pp. 480-494.
    • (2010) LNCS , vol.6174 , pp. 480-494
    • Cohen, E.1    Moskal, M.2    Schulte, W.3    Tobies, S.4
  • 20
    • 77955233685 scopus 로고    scopus 로고
    • From total store order to sequential consistency: A practical reduction theorem
    • Interactive Theorem Proving, ser.
    • E. Cohen and B. Schirmer, "From total store order to sequential consistency: A practical reduction theorem," in Interactive Theorem Proving, ser. LNCS, vol. 6172, 2010, pp. 403-418.
    • (2010) LNCS , vol.6172 , pp. 403-418
    • Cohen, E.1    Schirmer, B.2
  • 21
    • 79551546339 scopus 로고    scopus 로고
    • Efficient symbolic execution for analysing cryptographic protocol implementations
    • ESSoS, ser.
    • R. Corin and F. A. Manzano, "Efficient symbolic execution for analysing cryptographic protocol implementations," in ESSoS, ser. LNCS, vol. 6542, 2011, pp. 58-72.
    • (2011) LNCS , vol.6542 , pp. 58-72
    • Corin, R.1    Manzano, F.A.2
  • 23
    • 45749085681 scopus 로고    scopus 로고
    • Z3: An efficient SMT solver
    • TACAS, ser.
    • L. M. De Moura and N. Bjørner, "Z3: An efficient SMT solver," in TACAS, ser. LNCS, vol. 4963, 2008, pp. 337-340.
    • (2008) LNCS , vol.4963 , pp. 337-340
    • De Moura, L.M.1    Bjørner, N.2
  • 30
    • 24144470036 scopus 로고    scopus 로고
    • Cryptographic protocol analysis on real C code
    • Verification, Model Checking, and Abstract Interpretation - 6th International Conference, VMCAI 2005
    • J. Goubault-Larrecq and F. Parrennes, "Cryptographic protocol analysis on real c code," in VMCAI, ser. LNCS, vol. 3385, 2005, pp. 363-379. (Pubitemid 41231372)
    • (2005) Lecture Notes in Computer Science , vol.3385 , pp. 363-379
    • Goubault-Larrecq, J.1    Parrennes, F.2
  • 31
    • 24144433896 scopus 로고    scopus 로고
    • Implementing a formally verifiable security protocol in Java Card
    • Security in Pervasive Computing, ser.
    • E. Hubbers, M. Oostdijk, and E. Poll, "Implementing a formally verifiable security protocol in Java Card," in Security in Pervasive Computing, ser. LNCS, vol. 2802, 2004, pp. 213-226.
    • (2004) LNCS , vol.2802 , pp. 213-226
    • Hubbers, E.1    Oostdijk, M.2    Poll, E.3
  • 33
    • 80052678463 scopus 로고    scopus 로고
    • Dynamic model checking of C cryptographic protocol implementations
    • A. S. A. Jeffrey and R. Ley-Wild, "Dynamic model checking of C cryptographic protocol implementations," in FCS-ARSPA, 2006.
    • (2006) FCS-ARSPA
    • Jeffrey, A.S.A.1    Ley-Wild, R.2
  • 34
    • 34547455692 scopus 로고    scopus 로고
    • Security analysis of crypto-based java programs using automated theorem provers
    • J. Jürjens, "Security analysis of crypto-based java programs using automated theorem provers," in ASE, 2006, pp. 167-176.
    • (2006) ASE , pp. 167-176
    • Jürjens, J.1
  • 35
    • 33745802808 scopus 로고    scopus 로고
    • Formal certification of a compiler back-end or: Programming a compiler with a proof assistant
    • X. Leroy, "Formal certification of a compiler back-end or: programming a compiler with a proof assistant," in POPL, 2006, pp. 42-54.
    • (2006) POPL , pp. 42-54
    • Leroy, X.1
  • 37
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. M. Needham and M. D. Schroeder, "Using encryption for authentication in large networks of computers," Commun. ACM, vol. 21, no. 12, pp. 993-999, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 39
    • 85170368809 scopus 로고    scopus 로고
    • Offspark, Online. Available
    • Offspark, "Polarssl," 2008. [Online]. Available: http://polarssl.org
    • (2008) Polarssl
  • 40
    • 84889918117 scopus 로고    scopus 로고
    • Using Elyjah to analyse Java implementations of cryptographic protocols
    • N. O'Shea, "Using Elyjah to analyse Java implementations of cryptographic protocols," in FCS-ARSPA-WITS, 2008, pp. 211-223.
    • FCS-ARSPA-WITS, 2008 , pp. 211-223
    • O'Shea, N.1
  • 41
    • 36549020488 scopus 로고    scopus 로고
    • Rule-based static analysis of network protocol implementations
    • O. Udrea, C. Lumezanu, and J. S. Foster, "Rule-based static analysis of network protocol implementations," USENIX Security Symposium, pp. 193-208, 2006.
    • (2006) USENIX Security Symposium , pp. 193-208
    • Udrea, O.1    Lumezanu, C.2    Foster, J.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.