Formal methods analysis of the secure remote password protocol
AT Sherman, E Lanus, M Liskov, E Zieglar… - Logic, Language, and …, 2020 - Springer
Abstract We analyze the Secure Remote Password (SRP) protocol for structural weaknesses
using the Cryptographic Protocol Shapes Analyzer (CPSA) in the first formal analysis of SRP …
using the Cryptographic Protocol Shapes Analyzer (CPSA) in the first formal analysis of SRP …
A hybrid analysis for security protocols with state
Cryptographic protocols rely on message-passing to coordinate activity among principals.
Many richly developed tools, based on well-understood foundations, are available for the …
Many richly developed tools, based on well-understood foundations, are available for the …
Cryptographic Binding Should Not Be Optional: A Formal-Methods Analysis of FIDO UAF Authentication
E Golaszewski, AT Sherman, E Zieglar - ACM CCS (submitted), 2023 - par.nsf.gov
sa case study in cryptographic binding, we present a formal-methods analysis of the Fast
IDentity Online (FIDO) Universal Authentication Framework (UAF) authentication protocol's …
IDentity Online (FIDO) Universal Authentication Framework (UAF) authentication protocol's …
Understanding attestation: Analyzing protocols that use quotes
JD Guttman, JD Ramsdell - … City, Luxembourg, September 26–27, 2019 …, 2019 - Springer
Attestation protocols use digital signatures and other cryptographic values to convey
evidence of hardware state, program code, and associated keys. They require hardware …
evidence of hardware state, program code, and associated keys. They require hardware …
[PDF][PDF] The CPSA Specification: A Reduction System for Searching for Shapes in Cryptographic Protocols
JD Ramsdell, JD Guttman, MD Liskov… - The MITRE …, 2009 - hackage.haskell.org
We describe a term reduction system that enumerates all essentially different executions
possible for a cryptographic protocol. We call them the shapes of the protocol. Naturally …
possible for a cryptographic protocol. We call them the shapes of the protocol. Naturally …
Enrich-by-need protocol analysis for Diffie-Hellman
Enrich-by-need analysis characterizes all executions of a security protocol that extend a
given scenario. It computes a strongest security goal the protocol achieves in that scenario …
given scenario. It computes a strongest security goal the protocol achieves in that scenario …
[HTML][HTML] Cryptographic protocol analysis and compilation using CPSA and Roletran
JD Ramsdell - Protocols, Strands, and Logic: Essays Dedicated to …, 2021 - Springer
Abstract The Cryptographic Protocol Shapes Analyzer cpsa determines if a cryptographic
protocol achieves authentication and secrecy goals. It can be difficult to ensure that an …
protocol achieves authentication and secrecy goals. It can be difficult to ensure that an …
Automatically Binding Cryptographic Context to Messages in Network Using Formal Methods
E Golaszewski - 2024 - search.proquest.com
Using formal methods, we identify and correct the failure of cryptographic network protocols
to establish explicit session contexts and cryptographically bind their messages to these …
to establish explicit session contexts and cryptographically bind their messages to these …
Security protocol analysis in context: computing minimal executions using SMT and CPSA
Cryptographic protocols are used in different environments, but existing methods for protocol
analysis focus only on the protocols, without being sensitive to assumptions about their …
analysis focus only on the protocols, without being sensitive to assumptions about their …
Analysis of a forced-latency defense against man-in-the-middle attacks
EF Lanus, EV Zieglar - Journal of Information Warfare, 2017 - JSTOR
Several cryptographic protocols have been proposed to address the Man-in-the-Middle
(MitM) attack without the prior exchange of keys. In this paper, one such protocol proposed …
(MitM) attack without the prior exchange of keys. In this paper, one such protocol proposed …