Automated Verification of Real-World Cryptographic Implementations

被引:12
|
作者
Tomb, Aaron [1 ]
机构
[1] Galois, Xanthi, Greece
关键词
correctness proofs; cryptography; privacy; program verification; security; software engineering;
D O I
10.1109/MSP.2016.125
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptographic software is increasingly important but notoriously difficult to implement correctly. The open source Cryptol and Software Analysis Workbench tools can automatically and rigorously prove equivalence between machine-readable cryptographic specifications and real-world implementations.
引用
收藏
页码:26 / 33
页数:8
相关论文
共 50 条
  • [21] Automated Verification of Equivalence Properties of Cryptographic Protocols
    Chadha, Rohit
    Ciobaca, Stefan
    Kremer, Steve
    PROGRAMMING LANGUAGES AND SYSTEMS, 2012, 7211 : 108 - 127
  • [22] Quality of Automated Program Repair on Real-World Defects
    Motwani, Manish
    Soto, Mauricio
    Brun, Yuriy
    Just, Rene
    Le Goues, Claire
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2022, 48 (02) : 637 - 661
  • [23] Quality of Automated Program Repair on Real-World Defects
    Motwani, Manish
    Soto, Mauricio
    Brun, Yuriy
    Just, Rene
    Le Goues, Claire
    IEEE Transactions on Software Engineering, 2022, 48 (02): : 637 - 661
  • [24] Automated Security Analysis for Real-World IoT Devices
    Brun, Lelio
    Hasuo, Ichiro
    Ono, Yasushi
    Sekiyama, Taro
    PROCEEDINGS OF THE 12TH INTERNATIONAL WORKSHOP ON HARDWARE AND ARCHITECTURAL SUPPORT FOR SECURITY AND PRIVACY, HASP 2023, 2023, : 29 - 37
  • [25] Real-World Scenario Mining for the Assessment of Automated Vehicles
    de Gelder, Erwin
    Manders, Jeroen
    Grappiolo, Corrado
    Paardekooper, Jan-Pieter
    Op den Camp, Olaf
    De Schutter, Bart
    2020 IEEE 23RD INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS (ITSC), 2020,
  • [26] Demo Abstract: a Cryptographic Scheme for Real-World Wireless Sensor Networks Applications
    Marchesani, S.
    Pomante, L.
    Santucci, F.
    Pugliese, M.
    2013 ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS (ICCPS), 2013, : 249 - 249
  • [27] Automatic Verification of Cryptographic Block Function Implementations with Logical Equivalence Checking
    Lai, Li-Chang
    Liu, Jiaxiang
    Shi, Xiaomu
    Tsai, Ming-Hsien
    Wang, Bow-Yaw
    Yang, Bo-Yin
    COMPUTER SECURITY-ESORICS 2024, PT IV, 2024, 14985 : 377 - 395
  • [28] Real-world study: from real-world data to real-world evidence
    Wen, Yi
    TRANSLATIONAL BREAST CANCER RESEARCH, 2020, 1
  • [29] Innovative Interpolating Polynomial Approach to Fractional Integral Inequalities and Real-World Implementations
    Samraiz, Muhammad
    Naheed, Saima
    Gul, Ayesha
    Rahman, Gauhar
    Vivas-Cortez, Miguel
    AXIOMS, 2023, 12 (10)
  • [30] Trial of dynamic signature verification for a real-world identification solution
    Gifford, M
    Edwards, N
    BT TECHNOLOGY JOURNAL, 2005, 23 (02) : 259 - 266