Methodological Security Verification of a Registration Protocol

被引:0
|
作者
Diaz, Jesus [1 ]
Arroyo, David [1 ]
Rodriguez, Francisco B. [1 ]
机构
[1] Univ Autonoma Madrid, Escuela Politecn Super, Grp Neurocomputac Biol, Dept Ingn Informat, Madrid, Spain
关键词
D O I
10.1007/978-3-319-07995-0_45
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this work, we apply a secure protocol design methodology to a protocol based on a recently proposed email-based registration protocol. With this task, we aim to emphasize the need of incorporating such techniques as a main component of the protocol design process, not just as a desirable feature. The process herein described highlights the advantages in terms of the obtained security guarantees added to the final design, and also helps in the endeavor of further evaluating the applied methodology and the analyzed protocol.
引用
收藏
页码:453 / 462
页数:10
相关论文
共 50 条
  • [1] Abstractions for security protocol verification
    Binh Thanh Nguyen
    Sprenger, Christoph
    Cremers, Cas
    JOURNAL OF COMPUTER SECURITY, 2018, 26 (04) : 459 - 508
  • [2] Abstractions for security protocol verification
    Nguyen, Binh Thanh
    Sprenger, Christoph
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2015, 9036 : 196 - 215
  • [3] Security protocol specification and verification with AnBx
    Bugliesi, Michele
    Calzavara, Stefano
    Modersheim, Sebastian
    Modesti, Paolo
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2016, 30 : 46 - 63
  • [4] Automatic analyzer for security protocol verification
    Li, Xie-Hua
    Yang, Shu-Tang
    Li, Jian-Hua
    Zhu, Hong-Wen
    WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS, 2006, : 104 - 109
  • [5] Formal Verification of the Merchant Registration Phase of the SET Protocol
    Ma, Xiao-Qi
    Cheng, Xiao-Chun
    INTERNATIONAL JOURNAL OF AUTOMATION AND COMPUTING, 2005, 2 (02) : 155 - 162
  • [7] Formal verification of the Merchant Registration phase of the SET protocol
    Xiao-Qi Ma
    Xiao-Chun Cheng
    International Journal of Automation and Computing, 2005, 2 (2) : 155 - 162
  • [8] Formal Security Reassessment of the 5G-AKA-FS Protocol: Methodological Corrections and Augmented Verification Techniques
    Ko, Yongho
    Pawana, I Wayan Adi Juliawan
    You, Ilsun
    Sensors, 2024, 24 (24)
  • [9] Modular Verification of Security Protocol Code by Typing
    Bhargavan, Karthikeyan
    Fournet, Cedric
    Gordon, Andrew D.
    POPL'10: PROCEEDINGS OF THE 37TH ANNUAL ACM SIGPLAN-SIGACT SYMPOSIUM ON PRINCIPLES OF PROGRAMMING LANGUAGES, 2010, : 445 - 456
  • [10] Formal verification of security protocol implementations: a survey
    Avalle, Matteo
    Pironti, Alfredo
    Sisto, Riccardo
    FORMAL ASPECTS OF COMPUTING, 2014, 26 (01) : 99 - 123