메뉴 건너뛰기




Volumn , Issue , 2011, Pages 331-340

Extracting and verifying cryptographic models from C protocol code by symbolic execution

Author keywords

Security; Verification

Indexed keywords

C CODES; C PROGRAMS; COMPUTATIONAL SOUNDNESS; CRYPTOGRAPHIC PROTOCOLS; EXECUTION PATHS; MANUAL ANNOTATION; NETWORK MESSAGES; PROCESS CALCULI; PROTOCOL DESCRIPTION; SECURITY; SECURITY PROPERTIES; SOUND VERIFICATION; SOURCE CODES; SYMBOLIC DESCRIPTION; SYMBOLIC EXECUTION;

EID: 80755187803     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2046707.2046745     Document Type: Conference Paper
Times cited : (56)

References (30)
  • 1
    • 17644411480 scopus 로고    scopus 로고
    • Mobile values, new names, and secure communication
    • M. Abadi and C. Fournet. Mobile values, new names, and secure communication. In ACM POPL, pages 104-115, 2001.
    • (2001) ACM POPL , pp. 104-115
    • Abadi, M.1    Fournet, C.2
  • 5
    • 74049100112 scopus 로고    scopus 로고
    • CoSP: A general framework for computational soundness proofs
    • November Preprint on IACR ePrint 2009/080
    • M. Backes, D. Hofheinz, and D. Unruh. CoSP: A general framework for computational soundness proofs. In ACM CCS 2009, pages 66-78, November 2009. Preprint on IACR ePrint 2009/080.
    • (2009) ACM CCS 2009 , pp. 66-78
    • Backes, M.1    Hofheinz, D.2    Unruh, D.3
  • 7
    • 33751067991 scopus 로고    scopus 로고
    • A computationally sound mechanized prover for security protocols
    • DOI 10.1109/SP.2006.1, 1624008, Proceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006
    • B. Blanchet. A computationally sound mechanized prover for security protocols. In IEEE Symposium on Security and Privacy, pages 140-154. IEEE Computer Society, 2006. (Pubitemid 44753719)
    • (2006) Proceedings - IEEE Symposium on Security and Privacy , vol.2006 , pp. 140-154
    • Blanchet, B.1
  • 8
    • 68249091950 scopus 로고    scopus 로고
    • Automatic verification of correspondences for security protocols
    • B. Blanchet. Automatic verification of correspondences for security protocols. Journal of Computer Security, 17(4):363-434, 2009.
    • (2009) Journal of Computer Security , vol.17 , Issue.4 , pp. 363-434
    • Blanchet, B.1
  • 9
    • 38649141810 scopus 로고    scopus 로고
    • Automated verification of selected equivalences for security protocols
    • DOI 10.1016/j.jlap.2007.06.002, PII S1567832607000549
    • B. Blanchet, M. Abadi, and C. Fournet. Automated verification of selected equivalences for security protocols. Journal of Logic and Algebraic Programming, 75(1):3-51, Feb.-Mar. 2008. (Pubitemid 351172997)
    • (2008) Journal of Logic and Algebraic Programming , vol.75 , Issue.1 , pp. 3-51
    • Blanchet, B.1    Abadi, M.2    Fournet, C.3
  • 10
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudo-random bits
    • M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. Comput., 13(4):850-864, 1984. (Pubitemid 15510668)
    • (1984) SIAM Journal on Computing , vol.13 , Issue.4 , pp. 850-864
    • Blum Manuel1    Micali Silvio2
  • 13
    • 70350543796 scopus 로고    scopus 로고
    • ASPIER: An automated framework for verifying security protocol implementations
    • S. Chaki and A. Datta. ASPIER: An automated framework for verifying security protocol implementations. In Computer Security Foundations Workshop, pages 172-185, 2009.
    • (2009) Computer Security Foundations Workshop , pp. 172-185
    • Chaki, S.1    Datta, A.2
  • 15
    • 85050550846 scopus 로고
    • Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
    • Los Angeles, California ACM Press, New York, NY
    • P. Cousot and R. Cousot. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In Conference Record of the Fourth Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pages 238-252, Los Angeles, California, 1977. ACM Press, New York, NY.
    • (1977) Conference Record of the Fourth Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages , pp. 238-252
    • Cousot, P.1    Cousot, R.2
  • 20
    • 24144470036 scopus 로고    scopus 로고
    • Cryptographic protocol analysis on real C code
    • Verification, Model Checking, and Abstract Interpretation - 6th International Conference, VMCAI 2005
    • J. Goubault-Larrecq and F. Parrennes. Cryptographic protocol analysis on real C code. In Proceedings of the 6th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'05), volume 3385 of Lecture Notes in Computer Science, pages 363-379. Springer, 2005. (Pubitemid 41231372)
    • (2005) Lecture Notes in Computer Science , vol.3385 , pp. 363-379
    • Goubault-Larrecq, J.1    Parrennes, F.2
  • 21
    • 0016971687 scopus 로고
    • Symbolic execution and program testing
    • J. C. King. Symbolic execution and program testing. Commun. ACM, 19(7):385-394, 1976.
    • (1976) Commun. ACM , vol.19 , Issue.7 , pp. 385-394
    • King, J.C.1
  • 23
    • 79956084660 scopus 로고    scopus 로고
    • Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
    • R. Küsters and T. Truderung. Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach. Journal of Automated Reasoning, 46(3):325-352, 2011.
    • (2011) Journal of Automated Reasoning , vol.46 , Issue.3 , pp. 325-352
    • Küsters, R.1    Truderung, T.2
  • 24
    • 28144456308 scopus 로고
    • An attack on the needham-schroeder public-key authentication protocol
    • November
    • G. Lowe. An attack on the Needham-Schroeder public-key authentication protocol. Inf. Process. Lett., 56:131-133, November 1995.
    • (1995) Inf. Process. Lett. , vol.56 , pp. 131-133
    • Lowe, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.