메뉴 건너뛰기




Volumn 23, Issue 3, 2015, Pages 331-402

Proved generation of implementations from computationally secure protocol specifications

Author keywords

compiler; computational model; Cryptographic protocol; CryptoVerif; implementation; OCaml; verification

Indexed keywords

COMPUTATION THEORY; COMPUTATIONAL METHODS; NETWORK SECURITY; PROGRAM COMPILERS; SPECIFICATIONS; VERIFICATION;

EID: 84936762208     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-150524     Document Type: Conference Paper
Times cited : (7)

References (20)
  • 1
    • 84936816177 scopus 로고    scopus 로고
    • http://research.microsoft.com/en-us/projects/cvk/.
  • 2
    • 80755187803 scopus 로고    scopus 로고
    • Extracting and verifying cryptographic models from C protocol code by symbolic execution
    • New York
    • M. Aizatulin, A.D. Gordon and J. Jürjens, Extracting and verifying cryptographic models from C protocol code by symbolic execution, in: CCS'11, ACM, New York, 2011, pp. 331-340.
    • (2011) CCS'11 ACM , pp. 331-340
    • Aizatulin, M.1    Gordon, A.D.2    Jürjens, J.3
  • 3
    • 84869432338 scopus 로고    scopus 로고
    • Computational verification of C protocol implementations by symbolic execution
    • New York
    • M. Aizatulin, A.D. Gordon and J. Jürjens, Computational verification of C protocol implementations by symbolic execution, in: CCS'12, ACM, New York, 2012, pp. 712-723.
    • (2012) CCS'12 ACM , pp. 712-723
    • Aizatulin, M.1    Gordon, A.D.2    Jürjens, J.3
  • 6
    • 57849126802 scopus 로고    scopus 로고
    • Verified interoperable implementations of security protocols
    • K. Bhargavan, C. Fournet, A. Gordon and S. Tse, Verified interoperable implementations of security protocols, ACM TOPLAS 31(1) (2008), Article No. 5.
    • (2008) ACM TOPLAS , vol.31 , Issue.1
    • Bhargavan, K.1    Fournet, C.2    Gordon, A.3    Tse, S.4
  • 7
    • 55949087657 scopus 로고    scopus 로고
    • A computationally sound mechanized prover for security protocols
    • B. Blanchet, A computationally sound mechanized prover for security protocols, IEEE Transactions on Dependable and Secure Computing 5(4) (2008), 193-207.
    • (2008) IEEE Transactions on Dependable and Secure Computing , vol.5 , Issue.4 , pp. 193-207
    • Blanchet, B.1
  • 8
    • 84866904130 scopus 로고    scopus 로고
    • Automatically verified mechanized proof of one-encryption key exchange
    • Los Alamitos
    • B. Blanchet, Automatically verified mechanized proof of one-encryption key exchange, in: CSF'12, IEEE, Los Alamitos, 2012, pp. 325-339.
    • (2012) CSF'12 IEEE , pp. 325-339
    • Blanchet, B.1
  • 9
    • 33749579704 scopus 로고    scopus 로고
    • Automated security proofs with sequences of games
    • Springer
    • B. Blanchet and D. Pointcheval, Automated security proofs with sequences of games, in: CRYPTO'06, LNCS, Vol. 4117, Springer, 2006, pp. 537-554.
    • (2006) CRYPTO'06, LNCS , vol.4117 , pp. 537-554
    • Blanchet, B.1    Pointcheval, D.2
  • 11
    • 84874422917 scopus 로고    scopus 로고
    • Proved generation of implementations from computationally-secure protocol specifications
    • 2nd Conference on Principles of Security and Trust (POST 2013) Rome, Italy, March 2013, D. Basin and J. Mitchell, eds Springer
    • D. Cadé and B. Blanchet, Proved generation of implementations from computationally-secure protocol specifications, in: 2nd Conference on Principles of Security and Trust (POST 2013), Rome, Italy, March 2013, D. Basin and J. Mitchell, eds, LNCS, Vol. 7796, Springer, 2013, pp. 63-82.
    • (2013) LNCS , vol.7796 , pp. 63-82
    • Cadé, D.1    Blanchet, B.2
  • 12
    • 70350543796 scopus 로고    scopus 로고
    • ASPIER: An automated framework for verifying security protocol implementations
    • Los Alamitos
    • S. Chaki and A. Datta, ASPIER: An automated framework for verifying security protocol implementations, in: CSF'09, IEEE, Los Alamitos, 2009, pp. 172-185.
    • (2009) CSF'09 IEEE , pp. 172-185
    • Chaki, S.1    Datta, A.2
  • 13
    • 79551546339 scopus 로고    scopus 로고
    • Efficient symbolic execution for analysing cryptographic protocol implementations
    • Engineering Secure Software and Systems (ESSoS'11) Madrid, Spain, February 2011, Ú Erlingsson, R. Wieringa and N. Zannone, eds Springer
    • R. Corin and F.A. Manzano, Efficient symbolic execution for analysing cryptographic protocol implementations, in: Engineering Secure Software and Systems (ESSoS'11), Madrid, Spain, February 2011, Ú. Erlingsson, R.Wieringa and N. Zannone, eds, LNCS, Vol. 6542, Springer, 2011, pp. 58-72.
    • (2011) LNCS , vol.6542 , pp. 58-72
    • Corin, R.1    Manzano, F.A.2
  • 14
    • 80052648343 scopus 로고    scopus 로고
    • Guiding a general-purpose C verifier to prove cryptographic protocols
    • Los Alamitos
    • F. Dupressoir, A.D. Gordon, J. Jürjens and D.A. Naumann, Guiding a general-purpose C verifier to prove cryptographic protocols, in: CSF'11, IEEE, Los Alamitos, 2011, pp. 3-17.
    • (2011) CSF'11 IEEE , pp. 3-17
    • Dupressoir, F.1    Gordon, A.D.2    Jürjens, J.3    Naumann, D.A.4
  • 15
    • 80755169483 scopus 로고    scopus 로고
    • Modular code-based cryptographic verification
    • New York
    • C. Fournet, M. Kohlweiss and P.-Y. Strub, Modular code-based cryptographic verification, in: CCS'11, ACM, New York, 2011, pp. 341-350.
    • (2011) CCS'11 ACM , pp. 341-350
    • Fournet, C.1    Kohlweiss, M.2    Strub, P.-Y.3
  • 16
    • 84936755446 scopus 로고    scopus 로고
    • Spaces: Programming security protocols
    • G. Milicia, Spaces: Programming security protocols, in: NWPT'02, 2002.
    • (2002) NWPT'02
    • Milicia, G.1
  • 17
    • 47249096280 scopus 로고    scopus 로고
    • A sound semantics for OCaml light
    • ESOP'08, S. Drossopoulou, ed Springer, Heidelberg
    • S. Owens, A sound semantics for OCaml light, in: ESOP'08, S. Drossopoulou, ed., LNCS, Vol. 4960, Springer, Heidelberg, 2008, pp. 1-15.
    • (2008) LNCS , vol.4960 , pp. 1-15
    • Owens, S.1
  • 19
    • 77949567843 scopus 로고    scopus 로고
    • Provably correct Java implementations of Spi Calculus security protocols specifications
    • A. Pironti and R. Sisto, Provably correct Java implementations of Spi Calculus security protocols specifications, Computers and Security 29(3) (2010), 302-314.
    • (2010) Computers and Security , vol.29 , Issue.3 , pp. 302-314
    • Pironti, A.1    Sisto, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.