Formal Verification of Security Protocols: the Squirrel Prover (Keynote)

被引:0
|
作者
Delaune, Stephanie [1 ]
机构
[1] Univ Rennes, IRISA, CNRS, Rennes, France
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security protocols are widely used today to secure transactions that take place through public channels like the Internet. Common applications involve the secure transfer of sensitive information like credit card numbers or user authentication on a system. Because of their increasing ubiquity in many important applications (e.g. electronic commerce, government-issued ID), a very important research challenge consists in developing methods and verification tools to increase our trust on security protocols, and so on the applications that rely on them.
引用
收藏
页码:XI / XIV
页数:4
相关论文
共 50 条
  • [31] Formal verification of dependable distributed protocols
    Sinha, P
    Ren, DQ
    INFORMATION AND SOFTWARE TECHNOLOGY, 2003, 45 (12) : 873 - 888
  • [32] An Approach for Formal Verification of Authentication Protocols
    A. M. Mironov
    Lobachevskii Journal of Mathematics, 2022, 43 : 443 - 454
  • [33] Formal verification of mobile robot protocols
    Berard, Beatrice
    Lafourcade, Pascal
    Millet, Laure
    Potop-Butucaru, Maria
    Thierry-Mieg, Yann
    Tixeuil, Sebastien
    DISTRIBUTED COMPUTING, 2016, 29 (06) : 459 - 487
  • [34] An Approach for Formal Verification of Authentication Protocols
    Mironov, A. M.
    LOBACHEVSKII JOURNAL OF MATHEMATICS, 2022, 43 (02) : 443 - 454
  • [35] Formal Verification of Secure Forwarding Protocols
    Klenze, Tobias
    Sprenger, Christoph
    Basin, David
    2021 IEEE 34TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2021), 2021, : 313 - 328
  • [36] Formal verification of cryptographic protocols: A survey
    Meadows, CA
    ADVANCES IN CRYPTOLOGY - ASIACRYPT '94, 1995, 917 : 135 - 150
  • [37] Formal verification of delayed consistency protocols
    Pong, F
    Dubois, M
    10TH INTERNATIONAL PARALLEL PROCESSING SYMPOSIUM - PROCEEDINGS OF IPPS '96, 1996, : 124 - 131
  • [38] Formal compliance verification of interface protocols
    Yang, YC
    Huang, JD
    Yen, CC
    Shih, CH
    Jou, JY
    2005 IEEE VLSI-TSA INTERNATIONAL SYMPOSIUM ON VLSI DESIGN, AUTOMATION & TEST (VLSI-TSA-DAT), PROCEEDINGS OF TECHNICAL PAPERS, 2005, : 12 - 15
  • [39] Formal modeling and verification of security protocols on cloud computing systems based on UML 2.3
    Fang, Kunding
    Li, Xiaohong
    Hao, Jianye
    Feng, Zhiyong
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 852 - 859
  • [40] Verification of randomized security protocols
    Chadha, Rohit
    Sistla, A. Prasad
    Viswanathan, Mahesh
    2017 32ND ANNUAL ACM/IEEE SYMPOSIUM ON LOGIC IN COMPUTER SCIENCE (LICS), 2017,