Formal Verification of Security Protocols: the Squirrel Prover (Keynote)

被引:0
|
作者
Delaune, Stephanie [1 ]
机构
[1] Univ Rennes, IRISA, CNRS, Rennes, France
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security protocols are widely used today to secure transactions that take place through public channels like the Internet. Common applications involve the secure transfer of sensitive information like credit card numbers or user authentication on a system. Because of their increasing ubiquity in many important applications (e.g. electronic commerce, government-issued ID), a very important research challenge consists in developing methods and verification tools to increase our trust on security protocols, and so on the applications that rely on them.
引用
收藏
页码:XI / XIV
页数:4
相关论文
共 50 条
  • [1] Formal Verification of Security Protocols: the Squirrel Prover (Keynote)
    Delaune, Stephanie
    FOUNDATIONS AND PRACTICE OF SECURITY, PT II, FPS 2023, 2024, 14552 : XI - XIV
  • [2] Formal automatic verification of security protocols
    Xiao, Meihua
    Xue, Jinyun
    2006 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, 2006, : 566 - +
  • [3] Formal Verification of Security Protocols: ProVerif and Extensions
    Yao, Jiangyuan
    Xu, Chunxiang
    Li, Deshun
    Lin, Shengjun
    Cao, Xingcan
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT II, 2022, 13339 : 500 - 512
  • [4] Formal verification logic for hybrid security protocols
    Newe, T
    Coffey, T
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2003, 18 (01): : 17 - 25
  • [5] Formal Verification of Security Protocols Using Spin
    Chen, Shengbo
    Fu, Hao
    Miao, Huaikou
    2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2016, : 637 - 642
  • [6] Formal verification: an imperative step in the design of security protocols
    Coffey, T
    Dojen, R
    Flanagan, T
    COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2003, 43 (05): : 601 - 618
  • [7] An improved method for formal security verification of cryptographic protocols
    Watanabe, H
    Fujiwara, T
    Kasami, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1996, E79A (07) : 1089 - 1096
  • [8] A Formal Specification and Verification Framework for Timed Security Protocols
    Li, Li
    Sun, Jun
    Liu, Yang
    Sun, Meng
    Dong, Jin-Song
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2018, 44 (08) : 725 - 746
  • [9] Formal verification of type flaw attacks in security protocols
    Long, BW
    ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2003, : 415 - 424
  • [10] Security in Wireless Sensor Networks: A formal verification of protocols
    Nandi, Giann Spilere
    Pereira, David
    Vigil, Martin
    Moraes, Ricardo
    Morales, Analucia Schiaffino
    Araujo, Gustavo
    2019 IEEE 17TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2019, : 425 - 431