Security protocol verification: Symbolic and computational models

B Blanchet - International conference on principles of security and …, 2012 - Springer
Security protocol verification has been a very active research area since the 1990s. This
paper surveys various approaches in this area, considering the verification in the symbolic …

Modeling and verifying security protocols with the applied pi calculus and ProVerif

B Blanchet - Foundations and Trends® in Privacy and …, 2016 - nowpublishers.com
ProVerif is an automatic symbolic protocol verifier. It supports a wide range of cryptographic
primitives, defined by rewrite rules or by equations. It can prove various security properties …

SoK: Computer-aided cryptography

M Barbosa, G Barthe, K Bhargavan… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Computer-aided cryptography is an active area of research that develops and applies
formal, machine-checkable approaches to the design, analysis, and implementation of …

Universally composable security: A new paradigm for cryptographic protocols

R Canetti - Proceedings 42nd IEEE Symposium on Foundations …, 2001 - ieeexplore.ieee.org
We propose a novel paradigm for defining security of cryptographic protocols, called
universally composable security. The salient property of universally composable definitions …

Maude-NPA: Cryptographic protocol analysis modulo equational properties

S Escobar, C Meadows, J Meseguer - International School on …, 2007 - Springer
In this tutorial, we give an overview of the Maude-NRL Protocol Analyzer (Maude-NPA), a
tool for the analysis of cryptographic protocols using functions that obey different equational …

Automatic verification of correspondences for security protocols

B Blanchet - Journal of Computer Security, 2009 - content.iospress.com
We present a new technique for verifying correspondences in security protocols. In
particular, correspondences can be used to formalize authentication. Our technique is fully …

Automatic verification of security protocols in the symbolic model: The verifier proverif

B Blanchet - International School on Foundations of Security …, 2012 - Springer
After giving general context on the verification of security protocols, we focus on the
automatic symbolic protocol verifier ProVerif. This verifier can prove secrecy, authentication …

DEEPSEC: deciding equivalence properties in security protocols theory and practice

V Cheval, S Kremer… - 2018 IEEE symposium on …, 2018 - ieeexplore.ieee.org
Automated verification has become an essential part in the security evaluation of
cryptographic protocols. Recently, there has been a considerable effort to lift the theory and …

Model checking security protocols

D Basin, C Cremers, C Meadows - Handbook of Model Checking, 2018 - Springer
The formal analysis of security protocols is a prime example of a domain where model
checking has been successfully applied. Although security protocols are typically small …

An expressive model for the web infrastructure: Definition and application to the browser id sso system

D Fett, R Küsters, G Schmitz - 2014 IEEE Symposium on …, 2014 - ieeexplore.ieee.org
The web constitutes a complex infrastructure and, as demonstrated by numerous attacks,
rigorous analysis of standards and web applications is indispensable. Inspired by successful …