A static analysis of cryptographic processes: the denotational approach

被引:11
|
作者
Aziz, B [1 ]
Hamilton, G
Gray, D
机构
[1] Univ Coll, Dept Comp Sci, Cork, Ireland
[2] Dublin City Univ, Sch Comp, Dublin, Ireland
来源
关键词
D O I
10.1016/j.jlap.2004.09.006
中图分类号
学科分类号
摘要
This paper presents a non-uniform static analysis for detecting the term-substitution property in infinite cryptographic processes specified by the language of the spi calculus. The analysis is fully compositional following the denotational approach throughout. This renders the implementation of the analysis straightforward in functional programming. The results are then used to detect certain security breaches, like information leakage and authenticity breaches. As an example of its applicability, we apply the analysis to the SPLICE/AS protocol and the FTP server. (c) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:285 / 320
页数:36
相关论文
共 50 条
  • [41] Static Analysis of Communicating Processes Using Symbolic Transducers
    Botbol, Vincent
    Chailloux, Emmanuel
    Le Gall, Tristan
    VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION, VMCAI 2017, 2017, 10145 : 73 - 90
  • [42] Analysis of Cryptographic Protection of the Bitcoin Core Cryptographic Wallet
    Semyanov, P. V.
    Grezina, S. V.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2023, 57 (08) : 914 - 921
  • [43] Analysis of Cryptographic Protection of the Bitcoin Core Cryptographic Wallet
    P. V. Semyanov
    S. V. Grezina
    Automatic Control and Computer Sciences, 2023, 57 : 914 - 921
  • [44] History-dependent scheduling for cryptographic processes
    Vanackère, V
    VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION, PROCEEDINGS, 2004, 2937 : 16 - 29
  • [45] Indexed Principal Processes of Concurrent Cryptographic Protocols
    Wang, Huanbao
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 1279 - 1282
  • [46] DPA Resistance Analysis of the Cryptographic S-box Implementation in Static CMOS and TDPL Logic Style
    Kumar, Chintalapudi Satish
    Prathiba, A.
    Bhaskaran, V. S. Kanchana
    2017 INTERNATIONAL CONFERENCE ON NEXTGEN ELECTRONIC TECHNOLOGIES: SILICON TO SOFTWARE (ICNETS2), 2017, : 281 - 288
  • [47] Univariate Power Analysis Attacks Exploiting Static Dissipation of Nanometer CMOS VLSI Circuits for Cryptographic Applications
    Bellizia, Davide
    Bongiovanni, Simone
    Monsurro, Pietro
    Scotti, Giuseppe
    Trifiletti, Alessandro
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2017, 5 (03) : 329 - 339
  • [48] Denotational Approach to an Event-Driven System-Level Language
    Zhu, Huibiao
    He, Jifeng
    Peng, Xiaoqing
    Jin, Naiyong
    UNIFYING THEORIES OF PROGRAMMING, 2010, 5713 : 258 - 278
  • [49] An Approach to Static-Dynamic Software Analysis
    Gonzalez-de-Aledo, Pablo
    Sanchez, Pablo
    Huuck, Ralf
    FORMAL TECHNIQUES FOR SAFETY-CRITICAL SYSTEMS, (FTSCS 2015), 2016, 596 : 225 - 240
  • [50] An algebraic approach to the static analysis of concurrent software
    Esparza, J
    STATIC ANALYSIS, PROCEEDINGS, 2002, 2477 : 3 - 3