Scyther: Semantics and verification of security protocols

CJF Cremers - 2006 - research.tue.nl
Recent technologies have cleared the way for large scale application of electronic
communication. The open and distributed nature of these communications implies that the …

Automated verification of selected equivalences for security protocols

B Blanchet, M Abadi, C Fournet - The Journal of Logic and Algebraic …, 2008 - Elsevier
In the analysis of security protocols, methods and tools for reasoning about protocol
behaviors have been quite effective. We aim to expand the scope of those methods and …

Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps

A Armando, R Carbone, L Compagna… - Proceedings of the 6th …, 2008 - dl.acm.org
Single-Sign-On (SSO) protocols enable companies to establish a federated environment in
which clients sign in the system once and yet are able to access to services offered by …

Automatic verification of correspondences for security protocols

B Blanchet - Journal of Computer Security, 2009 - content.iospress.com
We present a new technique for verifying correspondences in security protocols. In
particular, correspondences can be used to formalize authentication. Our technique is fully …

Automatic proof of strong secrecy for security protocols

B Blanchet - IEEE Symposium on Security and Privacy, 2004 …, 2004 - ieeexplore.ieee.org
We present a new automatic technique for proving strong secrecy for security protocols.
Strong secrecy means that an adversary cannot see any difference when the value of the …

Deciding knowledge in security protocols under equational theories

M Abadi, V Cortier - Theoretical Computer Science, 2006 - Elsevier
The analysis of security protocols requires precise formulations of the knowledge of protocol
participants and attackers. In formal approaches, this knowledge is often treated in terms of …

Analyzing security protocols with secrecy types and logic programs

M Abadi, B Blanchet - Journal of the ACM (JACM), 2005 - dl.acm.org
We study and further develop two language-based techniques for analyzing security
protocols. One is based on a typed process calculus; the other, on untyped logic programs …

Types and effects for asymmetric cryptographic protocols

AD Gordon, A Jeffrey - Journal of Computer Security, 2004 - content.iospress.com
We present the first type and effect system for proving authenticity properties of security
protocols based on asymmetric cryptography. The most significant new features of our type …

Static validation of security protocols

C Bodei, M Buchholtz, P Degano… - Journal of …, 2005 - content.iospress.com
We methodically expand protocol narrations into terms of a process algebra in order to
specify some of the checks that need to be made in a protocol. We then apply static analysis …

AVATAR: A SysML environment for the formal verification of safety and security properties

G Pedroza, L Apvrille, D Knorreck - 2011 11th Annual …, 2011 - ieeexplore.ieee.org
Critical embedded systems-eg, automotive systems-are now commonly distributed, thus
exposing their communication links to attackers. The design of those systems shall therefore …