메뉴 건너뛰기




Volumn 21, Issue 1, 2013, Pages 41-87

Efficient construction of machine-checked symbolic protocol security proofs

Author keywords

automatic proof generation; formal methods; Security protocols; theorem proving

Indexed keywords

AUTOMATIC PROOF GENERATION; AUTOMATIC PROOFS; EFFICIENT CONSTRUCTION; HUMAN-READABLE; INFERENCE RULES; INTERACTIVE THEOREM PROVER; ISABELLE/HOL; PROTOCOL SECURITY; PROTOCOL SPECIFICATIONS; SECURITY PROTOCOLS;

EID: 84874349098     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2012-0455     Document Type: Article
Times cited : (10)

References (43)
  • 2
    • 33749582048 scopus 로고    scopus 로고
    • Interpretation of locales in Isabelle: Theories and proof contexts
    • MKM, J.M. Borwein and W.M. Farmer, eds Springer, Berlin
    • C. Ballarin, Interpretation of locales in Isabelle: theories and proof contexts, in: MKM, J.M. Borwein and W.M. Farmer, eds, Lecture Notes in Computer Science, Vol. 4108, Springer, Berlin, 2006, pp. 31-43.
    • (2006) Lecture Notes in Computer Science , vol.4108 , pp. 31-43
    • Ballarin, C.1
  • 8
    • 22444455879 scopus 로고    scopus 로고
    • Kerberos version 4: Inductive analysis of the secrecy goals
    • ESORICS, J.-J. Quisquater, Y. Deswarte, C. Meadows and D. Gollmann, eds Springer, Berlin
    • G. Bella and L.C. Paulson, Kerberos version 4: inductive analysis of the secrecy goals, in: ESORICS, J.-J. Quisquater, Y. Deswarte, C. Meadows and D. Gollmann, eds, Lecture Notes in Computer Science, Vol. 1485, Springer, Berlin, 1998, pp. 361-375.
    • (1998) Lecture Notes in Computer Science , vol.1485 , pp. 361-375
    • Bella, G.1    Paulson, L.C.2
  • 9
    • 77950909049 scopus 로고    scopus 로고
    • Modular verification of security protocol code by typing
    • M.V. Hermenegildo and J. Palsberg, eds, ACM Press, New York, NY
    • K. Bhargavan, C. Fournet and A.D. Gordon, Modular verification of security protocol code by typing, in: POPL, M.V. Hermenegildo and J. Palsberg, eds, ACM Press, New York, NY, 2010, pp. 445-456.
    • (2010) POPL , pp. 445-456
    • Bhargavan, K.1    Fournet, C.2    Gordon, A.D.3
  • 10
    • 55949087657 scopus 로고    scopus 로고
    • A computationally sound mechanized prover for security protocols
    • B. Blanchet, A computationally sound mechanized prover for security protocols, IEEE Transactions on Dependable and Secure Computing 5(4) (2008), 193-207.
    • (2008) IEEE Transactions on Dependable and Secure Computing , vol.5 , Issue.4 , pp. 193-207
    • Blanchet, B.1
  • 11
    • 68249091950 scopus 로고    scopus 로고
    • Automatic verification of correspondences for security protocols
    • B. Blanchet, Automatic verification of correspondences for security protocols, J. Comput. Secur. 17(4) (2009), 363-434.
    • (2009) J. Comput. Secur. , vol.17 , Issue.4 , pp. 363-434
    • Blanchet, B.1
  • 13
    • 77953255971 scopus 로고    scopus 로고
    • Integrating Automated and Interactive Protocol Verification In: Fo r-mal Aspects in Security and Trust
    • P. Degano and J. Guttman, eds Springer, Berlin
    • A. Brucker and S. Mödersheim, Integrating automated and interactive protocol verification, in: Fo r-mal Aspects in Security and Trust, P. Degano and J. Guttman, eds, Lecture Notes in Computer Science, Vol. 5983, Springer, Berlin, 2010, pp. 248-262.
    • (2010) Lecture Notes in Computer Science , vol.5983 , pp. 248-262
    • Brucker, A.1    Mödersheim, S.2
  • 14
    • 0037271415 scopus 로고    scopus 로고
    • First-order verification of cryptographic protocols
    • E. Cohen, First-order verification of cryptographic protocols, J. Comput. Secur. 11(2) (2003), 189-216.
    • (2003) J. Comput. Secur. , vol.11 , Issue.2 , pp. 189-216
    • Cohen, E.1
  • 15
    • 67650240831 scopus 로고    scopus 로고
    • Unbounded verification, falsification and characterization of security protocols by pattern refinement
    • ACM Press, New York, NY
    • C. Cremers, Unbounded verification, falsification and characterization of security protocols by pattern refinement, in: Proceedings of the 15th ACM Conference on Computer and Communications Security, ACM Press, New York, NY, 2008, pp. 119-128.
    • (2008) Proceedings of the 15th ACM Conference on Computer and Communications Security , pp. 119-128
    • Cremers, C.1
  • 17
    • 33750487822 scopus 로고    scopus 로고
    • Injective synchronisation: An extension of the authentication hierarchy
    • C. Cremers, S. Mauw and E. de Vink, Injective synchronisation: an extension of the authentication hierarchy, Theor. Comput. Sci. 367 (2006), 139-161.
    • (2006) Theor. Comput. Sci. , vol.367 , pp. 139-161
    • Cremers, C.1    Mauw, S.2    De Vink, E.3
  • 19
    • 35048899619 scopus 로고    scopus 로고
    • Searching for shapes in cryptographic protocols, in: TACAS
    • O. Grumberg and M. Huth, eds Springer, Berlin
    • S.F. Doghmi, J.D. Guttman and F.J. Thayer, Searching for shapes in cryptographic protocols, in: TACAS, O. Grumberg and M. Huth, eds, Lecture Notes in Computer Science, Vol. 4424, Springer, Berlin, 2007, pp. 523-537.
    • (2007) Lecture Notes in Computer Science , vol.4424 , pp. 523-537
    • Doghmi, S.F.1    Guttman, J.D.2    Thayer, F.J.3
  • 20
    • 3042538605 scopus 로고    scopus 로고
    • Multiset rewriting and the complexity of bounded security protocols
    • N.A. Durgin, P. Lincoln and J.C. Mitchell, Multiset rewriting and the complexity of bounded security protocols, J. Comput. Secur. 12(2) (2004), 247-311.
    • (2004) J. Comput. Secur. , vol.12 , Issue.2 , pp. 247-311
    • Durgin, N.A.1    Lincoln, P.2    Mitchell, J.C.3
  • 21
    • 20144370847 scopus 로고    scopus 로고
    • Verifying security protocols with PVS: Widening the rank function approach
    • N. Evans and S.A. Schneider, Verifying security protocols with PVS: widening the rank function approach, J. Log. Algebr. Program. 64(2) (2005), 253-284.
    • (2005) J. Log. Algebr. Program. , vol.64 , Issue.2 , pp. 253-284
    • Evans, N.1    Schneider, S.A.2
  • 22
    • 0042240361 scopus 로고
    • Mechanizing programming logics in higher order logic
    • G. Birtwistle and P.A. Subrahmanyam, eds, Springer, New York
    • M.J.C. Gordon, Mechanizing programming logics in higher order logic, in: Current Trends in Hardware Verification and Automated Theorem Proving, G. Birtwistle and P.A. Subrahmanyam, eds, Springer, New York, 1989, pp. 387-439.
    • (1989) Current Trends in Hardware Verification and Automated Theorem Proving , pp. 387-439
    • Gordon, M.J.C.1
  • 23
    • 77957127463 scopus 로고    scopus 로고
    • Finite models for formal security proofs
    • J. Goubault-Larrecq, Finite models for formal security proofs, J. Comput. Secur. 18(6) (2010), 1247-1299.
    • (2010) J. Comput. Secur. , vol.18 , Issue.6 , pp. 1247-1299
    • Goubault-Larrecq, J.1
  • 24
    • 3042563843 scopus 로고    scopus 로고
    • Authentication tests and disjoint encryption: A design method for security protocols
    • J.D. Guttman, Authentication tests and disjoint encryption: a design method for security protocols, J. Comput. Secur. 12 (2004), 409-433.
    • (2004) J. Comput. Secur. , vol.12 , pp. 409-433
    • Guttman, J.D.1
  • 25
    • 0037268614 scopus 로고    scopus 로고
    • How to prevent type flaw attacks on security protocols
    • J. Heather, G. Lowe and S. Schneider, How to prevent type flaw attacks on security protocols, J. Comput. Secur. 11(2) (2003), 217-244.
    • (2003) J. Comput. Secur. , vol.11 , Issue.2 , pp. 217-244
    • Heather, J.1    Lowe, G.2    Schneider, S.3
  • 27
    • 71749089654 scopus 로고    scopus 로고
    • Semantics and logic for security protocols
    • B. Jacobs and I. Hasuo, Semantics and logic for security protocols, J. Comput. Secur. 17(6) (2009), 909-944.
    • (2009) J. Comput. Secur. , vol.17 , Issue.6 , pp. 909-944
    • Jacobs, B.1    Hasuo, I.2
  • 28
    • 12744277366 scopus 로고    scopus 로고
    • On preventing type flaw attacks on security protocols with a simplified tagging scheme
    • Y. Li, W. Yang and C.-W. Huang, On preventing type flaw attacks on security protocols with a simplified tagging scheme, J. Inf. Sci. Eng. 21(1) (2005), 59-84.
    • (2005) J. Inf. Sci. Eng. , vol.21 , Issue.1 , pp. 59-84
    • Li, Y.1    Yang, W.2    Huang, C.-W.3
  • 29
    • 0030708255 scopus 로고    scopus 로고
    • A hierarchy of authentication specifications
    • Rockport, MA, IEEE Press
    • G. Lowe, A hierarchy of authentication specifications, in: Proc. 10th Computer Security Foundations Workshop, Rockport, MA, IEEE Press, 1997, pp. 31-43.
    • (1997) Proc. 10th Computer Security Foundations Workshop , pp. 31-43
    • Lowe, G.1
  • 30
    • 77956148457 scopus 로고    scopus 로고
    • How to evaluate the security of real-life cryptographic protocols?-The cases of ISO/IEC 29128 and CRYPTREC
    • Canary Islands, Spain, Revised Selected Papers, Lecture Notes in Computer Science Springer, Berlin
    • S. Matsuo, K. Miyazaki, A. Otsuka and D.A. Basin, How to evaluate the security of real-life cryptographic protocols?-The cases of ISO/IEC 29128 and CRYPTREC, in: Financial Cryptography and Data Security, FC 2010 Workshops, RLCPS, WECSR and WLC 2010, Tenerife, Canary Islands, Spain, Revised Selected Papers, Lecture Notes in Computer Science, Vol. 6054, Springer, Berlin, 2010, pp. 182-194.
    • (2010) Financial Cryptography and Data Security, FC 2010 Workshops, RLCPS, WECSR and WLC 2010, Tenerife , vol.6054 , pp. 182-194
    • Matsuo, S.1    Miyazaki, K.2    Otsuka, A.3    Basin, D.A.4
  • 32
    • 77957568200 scopus 로고    scopus 로고
    • Strong invariants for the efficient construction of machine-checked protocol security proofs
    • S. Meier, C.J.F. Cremers and D.A. Basin, Strong invariants for the efficient construction of machine-checked protocol security proofs, in: CSF, IEEE Computer Society, 2010, pp. 231-245.
    • (2010) CSF, IEEE Computer Society , pp. 231-245
    • Meier, S.1    Cremers, C.J.F.2    Basin, D.A.3
  • 33
    • 70349335930 scopus 로고    scopus 로고
    • The open-source fixed-point model checker for symbolic analysis of security protocols, in: FOSAD
    • A. Aldini, G. Barthe and R. Gorrieri, eds Springer, Berlin
    • S. Mödersheim and L. Viganò, The open-source fixed-point model checker for symbolic analysis of security protocols, in: FOSAD, A. Aldini, G. Barthe and R. Gorrieri, eds, Lecture Notes in Computer Science, Vol. 5705, Springer, Berlin, 2009, pp. 166-194.
    • (2009) Lecture Notes in Computer Science , vol.5705 , pp. 166-194
    • Mödersheim, S.1    Viganò, L.2
  • 34
  • 35
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L.C. Paulson, The inductive approach to verifying cryptographic protocols, J. Comput. Secur. 6 (1998), 85-128.
    • (1998) J. Comput. Secur. , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 36
    • 85024252307 scopus 로고    scopus 로고
    • Inductive analysis of the internet protocol TLS
    • L.C. Paulson, Inductive analysis of the internet protocol TLS, ACM Trans. Inf. Syst. Secur. 2(3) (1999), 332-351.
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.3 , pp. 332-351
    • Paulson, L.C.1
  • 37
    • 0034950756 scopus 로고    scopus 로고
    • Relations between secrets: Two formal analyses of the yahalom protocol
    • L.C. Paulson, Relations between secrets: two formal analyses of the Yahalom protocol, J. Comput. Secur. 9(3) (2001), 197-216.
    • (2001) J. Comput. Secur. , vol.9 , Issue.3 , pp. 197-216
    • Paulson, L.C.1
  • 38
    • 84866938883 scopus 로고    scopus 로고
    • Automated analysis of Diffie-Hellman protocols and advanced security properties
    • Cambridge MA, USA, IEEE Computer Society, Los Alamitos, CA
    • B. Schmidt, S. Meier, C. Cremers and D.A. Basin, Automated analysis of Diffie-Hellman protocols and advanced security properties, in: Proceedings of the 25rd IEEE Computer Security Foundations Symposium, Cambridge MA, USA, IEEE Computer Society, Los Alamitos, CA, 2012, pp. 78-94.
    • (2012) Proceedings of the 25rd IEEE Computer Security Foundations Symposium , pp. 78-94
    • Schmidt, B.1    Meier, S.2    Cremers, C.3    Basin, D.A.4
  • 39
    • 0030684956 scopus 로고    scopus 로고
    • Verifying authentication protocols with CSP
    • Rockport, MA, IEEE Press
    • S. Schneider, Verifying authentication protocols with CSP, in: Proc. 10th Computer Security Foundations Workshop, Rockport, MA, IEEE Press, 1997, pp. 3-17.
    • (1997) Proc. 10th Computer Security Foundations Workshop , pp. 3-17
    • Schneider, S.1
  • 40
    • 0035072287 scopus 로고    scopus 로고
    • Athena: A novel approach to efficient automatic security protocol analysis
    • D. Song, S. Berezin and A. Perrig, Athena: a novel approach to efficient automatic security protocol analysis, J. Comput. Secur. 9 (2001), 47-74.
    • (2001) J. Comput. Secur. , vol.9 , pp. 47-74
    • Song, D.1    Berezin, S.2    Perrig, A.3
  • 41
    • 84874344811 scopus 로고    scopus 로고
    • SPORE-Security Protocols Open Repository
    • SPORE-Security Protocols Open Repository, 2005, http://www.lsv.ens- cachan.fr/spore.
    • (2005)
  • 42
    • 0033344295 scopus 로고    scopus 로고
    • Strand spaces: Proving security protocols correct
    • F.J. Thayer, J.C. Herzog and J.D. Guttman, Strand spaces: proving security protocols correct, J. Comput. Secur. 7(1) (1999), 191-230.
    • (1999) J. Comput. Secur. , vol.7 , Issue.1 , pp. 191-230
    • Thayer, F.J.1    Herzog, J.C.2    Guttman, J.D.3
  • 43
    • 57049134167 scopus 로고    scopus 로고
    • The Isabelle framework, in: TPHOLs
    • O.A. Mohamed, C. Muñoz and S. Tahar, eds Springer, Berlin
    • M. Wenzel, L.C. Paulson and T. Nipkow, The Isabelle framework, in: TPHOLs, O.A. Mohamed, C. Muñoz and S. Tahar, eds, Lecture Notes in Computer Science, Vol. 5170. Springer, Berlin, 2008, pp. 33-38.
    • (2008) Lecture Notes in Computer Science , vol.5170 , pp. 33-38
    • Wenzel, M.1    Paulson, L.C.2    Nipkow, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.