AnBx: Automatic generation and verification of security protocols implementations

被引:0
|
作者
School of Computing Science, Newcastle University, Newcastle upon Tyne, United Kingdom [1 ]
机构
来源
关键词
Engineering Village;
D O I
暂无
中图分类号
学科分类号
摘要
Abstract modeling - Automatic Generation - Consistency checks - Java codes - Java implementation - Model driven development approaches - Security goals - Security protocols
引用
收藏
相关论文
共 50 条
  • [21] Automatic Generation of Security Protocols Based on Evolutionary Algorithm
    Zhou, Yajie
    Zhang, Jingwei
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE OF MANAGEMENT ENGINEERING AND INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2009, : 85 - 88
  • [22] Verification of Security Protocols
    Cortier, Veronique
    VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION, 2009, 5403 : 5 - 13
  • [23] Verified Interoperable Implementations of Security Protocols
    Bhargavan, Karthikeyan
    Fournet, Cedric
    Gordon, Andrew D.
    Tse, Stephen
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2008, 31 (01):
  • [24] Verifying Implementations of Security Protocols by Refinement
    Polikarpova, Nadia
    Moskal, Michal
    VERIFIED SOFTWARE: THEORIES, TOOLS, EXPERIMENTS, 2012, 7152 : 50 - +
  • [25] An experiment in automatic generation of test suites for protocols with verification technology
    Fernandez, JC
    Jard, C
    Jeron, T
    Viho, C
    SCIENCE OF COMPUTER PROGRAMMING, 1997, 29 (1-2) : 123 - 146
  • [26] Towards Automatic Property Generation for SoC Security Verification
    Wang, Xingxin
    Tang, Shibo
    Hu, Wei
    Proceedings - International SoC Design Conference 2022, ISOCC 2022, 2022, : 209 - 210
  • [27] Towards Automatic Property Generation for SoC Security Verification
    Wang, Xingxin
    Tang, Shibo
    Hu, Wei
    2022 19TH INTERNATIONAL SOC DESIGN CONFERENCE (ISOCC), 2022, : 209 - 210
  • [28] Automatic generation of sources lemmas in TAMARIN: Towards automatic proofs of security protocols
    Cortier, Veronique
    Delaune, Stephanie
    Dreier, Jannik
    Klein, Elise
    JOURNAL OF COMPUTER SECURITY, 2022, 30 (04) : 573 - 598
  • [29] Automatic Generation of Sources Lemmas in TAMARIN: Towards Automatic Proofs of Security Protocols
    Cortier, Veronique
    Delaune, Stephanie
    Dreier, Jannik
    COMPUTER SECURITY - ESORICS 2020, PT II, 2020, 12309 : 3 - 22
  • [30] Automatic verification of transparency protocols
    Cheval, Vincent
    Moreira, Jose
    Ryan, Mark
    2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P, 2023, : 107 - 121