Automated Verification Of Cryptographic Protocol Implementations

被引:0
|
作者
Babenko, Liudmila [1 ]
Pisarev, Ilya [1 ]
机构
[1] Southern Fed Univ, Informat Technol Secur Dept, Taganrog, Russia
关键词
verification; parser; translator; dynamic analysis; formal verification; cryptographic protocols; model;
D O I
10.1109/DeSE.2019.00157
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
When implementing systems using a secure data connection between components, it is important to analyze the security of data transmission. Secure data transfer is achieved by using cryptographic protocols. It is important to verify the security of cryptographic protocols already implemented in the system, since this is the last iteration of their compilation in the form of their implementation in the selected progranuning language. The paper proposes a scheme and approaches for creating an automated security verifier of cryptographic protocol implementations. The problems that arise when implementing cryptographic protocols in progranuning languages are described. A verification scheme based on the use of a source code analyzer for extracting the structure of cryptographic protocols, translating their structure of the Alice-Bob format protocol into the specification language for formal verifiers, and dynamic analysis of the implementation code is presented. The approaches for the implementation of the analyzer, translator and dynamic analyser are described, as well as the future work.
引用
收藏
页码:849 / 854
页数:6
相关论文
共 50 条
  • [1] Automated Verification of Real-World Cryptographic Implementations
    Tomb, Aaron
    IEEE SECURITY & PRIVACY, 2016, 14 (06) : 26 - 33
  • [2] Verification of Implementations of Cryptographic Hash Functions
    Wang, Dexi
    Jiang, Yu
    Song, Houbing
    He, Fei
    Gu, Ming
    Sun, Jiaguang
    IEEE ACCESS, 2017, 5 : 7816 - 7825
  • [3] Probabilistic Relational Verification for Cryptographic Implementations
    Barthe, Gilles
    Fournet, Cedric
    Gregoire, Benjamin
    Strub, Pierre-Yves
    Swamy, Nikhil
    Zanella-Beguelin, Santiago
    ACM SIGPLAN NOTICES, 2014, 49 (01) : 193 - 205
  • [4] Vivienne: Relational Verification of Cryptographic Implementations in WebAssembly
    Tsoupidi, Rodothea Myrsini
    Balliu, Musard
    Baudry, Benoit
    2021 IEEE SECURE DEVELOPMENT CONFERENCE (SECDEV 2021), 2021, : 94 - 102
  • [5] Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project
    Computing Department, Open University, United Kingdom
    Electron. Notes Theor. Comput. Sci., 1 (123-136):
  • [6] Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project
    Jurjens, Jan
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 250 (01) : 123 - 136
  • [7] Rewriting for cryptographic protocol verification
    Genet, T
    Klay, F
    AUTOMATED DEDUCTION - CADE-17, 2000, 1831 : 271 - 290
  • [8] Automated verification tools for cryptographic protocols
    Hassan, Adel
    Ishaq, Isam
    Minilla, Jorge
    2021 INTERNATIONAL CONFERENCE ON PROMISING ELECTRONIC TECHNOLOGIES (ICPET 2021), 2021, : 58 - 65
  • [9] Advanced method for cryptographic protocol verification
    El Kadhi, Nabil
    El-Gendy, Hazem
    JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2006, 6 (5-6) : S109 - S119
  • [10] Identifying and testing for insecure paths in cryptographic protocol implementations
    Jayaram, K. R.
    30th Annual International Computer Software and Applications Conference, Vol 2, Short Papers/Workshops/Fast Abstracts/Doctoral Symposium, Proceedings, 2006, : 368 - 369