-
1
-
-
84936816177
-
-
http://research.microsoft.com/en-us/projects/cvk/.
-
-
-
-
2
-
-
80755187803
-
Extracting and verifying cryptographic models from C protocol code by symbolic execution
-
New York
-
M. Aizatulin, A.D. Gordon and J. Jürjens, Extracting and verifying cryptographic models from C protocol code by symbolic execution, in: CCS'11, ACM, New York, 2011, pp. 331-340.
-
(2011)
CCS'11 ACM
, pp. 331-340
-
-
Aizatulin, M.1
Gordon, A.D.2
Jürjens, J.3
-
3
-
-
84869432338
-
Computational verification of C protocol implementations by symbolic execution
-
New York
-
M. Aizatulin, A.D. Gordon and J. Jürjens, Computational verification of C protocol implementations by symbolic execution, in: CCS'12, ACM, New York, 2012, pp. 712-723.
-
(2012)
CCS'12 ACM
, pp. 712-723
-
-
Aizatulin, M.1
Gordon, A.D.2
Jürjens, J.3
-
4
-
-
84889046183
-
Certified computer-aided cryptography: Efficient provably secure machine code from high-level implementations
-
November 2013, ACM
-
J.B. Almeida, M. Barbosa, G. Barthe and F. Dupressoir, Certified computer-aided cryptography: Efficient provably secure machine code from high-level implementations, in: ACMSIGSAC Conference on Computer and Communications Security (CCS'13), Berlin, Germany, November 2013, ACM, 2013, pp. 1217-1230.
-
(2013)
ACMSIGSAC Conference on Computer and Communications Security (CCS'13), Berlin, Germany
, pp. 1217-1230
-
-
Almeida, J.B.1
Barbosa, M.2
Barthe, G.3
Dupressoir, F.4
-
5
-
-
79951546693
-
Refinement types for secure implementations
-
J. Bengtson, K. Bhargavan, C. Fournet, A. Gordon and S. Maffeis, Refinement types for secure implementations, ACM TOPLAS 33(2) (2011), Article No. 8.
-
(2011)
ACM TOPLAS
, vol.33
, Issue.2
-
-
Bengtson, J.1
Bhargavan, K.2
Fournet, C.3
Gordon, A.4
Maffeis, S.5
-
6
-
-
57849126802
-
Verified interoperable implementations of security protocols
-
K. Bhargavan, C. Fournet, A. Gordon and S. Tse, Verified interoperable implementations of security protocols, ACM TOPLAS 31(1) (2008), Article No. 5.
-
(2008)
ACM TOPLAS
, vol.31
, Issue.1
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.3
Tse, S.4
-
7
-
-
55949087657
-
A computationally sound mechanized prover for security protocols
-
B. Blanchet, A computationally sound mechanized prover for security protocols, IEEE Transactions on Dependable and Secure Computing 5(4) (2008), 193-207.
-
(2008)
IEEE Transactions on Dependable and Secure Computing
, vol.5
, Issue.4
, pp. 193-207
-
-
Blanchet, B.1
-
8
-
-
84866904130
-
Automatically verified mechanized proof of one-encryption key exchange
-
Los Alamitos
-
B. Blanchet, Automatically verified mechanized proof of one-encryption key exchange, in: CSF'12, IEEE, Los Alamitos, 2012, pp. 325-339.
-
(2012)
CSF'12 IEEE
, pp. 325-339
-
-
Blanchet, B.1
-
9
-
-
33749579704
-
Automated security proofs with sequences of games
-
Springer
-
B. Blanchet and D. Pointcheval, Automated security proofs with sequences of games, in: CRYPTO'06, LNCS, Vol. 4117, Springer, 2006, pp. 537-554.
-
(2006)
CRYPTO'06, LNCS
, vol.4117
, pp. 537-554
-
-
Blanchet, B.1
Pointcheval, D.2
-
10
-
-
84886918886
-
From computationally-proved protocol specifications to implementations and application to SSH
-
D. Cadé and B. Blanchet, From computationally-proved protocol specifications to implementations and application to SSH, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) 4(1) (2013), 4-31.
-
(2013)
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)
, vol.4
, Issue.1
, pp. 4-31
-
-
Cadé, D.1
Blanchet, B.2
-
11
-
-
84874422917
-
Proved generation of implementations from computationally-secure protocol specifications
-
2nd Conference on Principles of Security and Trust (POST 2013) Rome, Italy, March 2013, D. Basin and J. Mitchell, eds Springer
-
D. Cadé and B. Blanchet, Proved generation of implementations from computationally-secure protocol specifications, in: 2nd Conference on Principles of Security and Trust (POST 2013), Rome, Italy, March 2013, D. Basin and J. Mitchell, eds, LNCS, Vol. 7796, Springer, 2013, pp. 63-82.
-
(2013)
LNCS
, vol.7796
, pp. 63-82
-
-
Cadé, D.1
Blanchet, B.2
-
12
-
-
70350543796
-
ASPIER: An automated framework for verifying security protocol implementations
-
Los Alamitos
-
S. Chaki and A. Datta, ASPIER: An automated framework for verifying security protocol implementations, in: CSF'09, IEEE, Los Alamitos, 2009, pp. 172-185.
-
(2009)
CSF'09 IEEE
, pp. 172-185
-
-
Chaki, S.1
Datta, A.2
-
13
-
-
79551546339
-
Efficient symbolic execution for analysing cryptographic protocol implementations
-
Engineering Secure Software and Systems (ESSoS'11) Madrid, Spain, February 2011, Ú Erlingsson, R. Wieringa and N. Zannone, eds Springer
-
R. Corin and F.A. Manzano, Efficient symbolic execution for analysing cryptographic protocol implementations, in: Engineering Secure Software and Systems (ESSoS'11), Madrid, Spain, February 2011, Ú. Erlingsson, R.Wieringa and N. Zannone, eds, LNCS, Vol. 6542, Springer, 2011, pp. 58-72.
-
(2011)
LNCS
, vol.6542
, pp. 58-72
-
-
Corin, R.1
Manzano, F.A.2
-
14
-
-
80052648343
-
Guiding a general-purpose C verifier to prove cryptographic protocols
-
Los Alamitos
-
F. Dupressoir, A.D. Gordon, J. Jürjens and D.A. Naumann, Guiding a general-purpose C verifier to prove cryptographic protocols, in: CSF'11, IEEE, Los Alamitos, 2011, pp. 3-17.
-
(2011)
CSF'11 IEEE
, pp. 3-17
-
-
Dupressoir, F.1
Gordon, A.D.2
Jürjens, J.3
Naumann, D.A.4
-
15
-
-
80755169483
-
Modular code-based cryptographic verification
-
New York
-
C. Fournet, M. Kohlweiss and P.-Y. Strub, Modular code-based cryptographic verification, in: CCS'11, ACM, New York, 2011, pp. 341-350.
-
(2011)
CCS'11 ACM
, pp. 341-350
-
-
Fournet, C.1
Kohlweiss, M.2
Strub, P.-Y.3
-
16
-
-
84936755446
-
Spaces: Programming security protocols
-
G. Milicia, Spaces: Programming security protocols, in: NWPT'02, 2002.
-
(2002)
NWPT'02
-
-
Milicia, G.1
-
17
-
-
47249096280
-
A sound semantics for OCaml light
-
ESOP'08, S. Drossopoulou, ed Springer, Heidelberg
-
S. Owens, A sound semantics for OCaml light, in: ESOP'08, S. Drossopoulou, ed., LNCS, Vol. 4960, Springer, Heidelberg, 2008, pp. 1-15.
-
(2008)
LNCS
, vol.4960
, pp. 1-15
-
-
Owens, S.1
-
19
-
-
77949567843
-
Provably correct Java implementations of Spi Calculus security protocols specifications
-
A. Pironti and R. Sisto, Provably correct Java implementations of Spi Calculus security protocols specifications, Computers and Security 29(3) (2010), 302-314.
-
(2010)
Computers and Security
, vol.29
, Issue.3
, pp. 302-314
-
-
Pironti, A.1
Sisto, R.2
-
20
-
-
80054054746
-
Secure distributed programming with valuedependent types
-
New York
-
N. Swamy, J. Chen, C. Fournet, P.-Y. Strub, K. Bharagavan and J. Yang, Secure distributed programming with valuedependent types, in: ICFP'11, ACM, New York, 2011, pp. 266-278.
-
(2011)
ICFP'11 ACM
, pp. 266-278
-
-
Swamy, N.1
Chen, J.2
Fournet, C.3
Strub, P.-Y.4
Bharagavan, K.5
Yang, J.6
|