Modeling and verifying security protocols with the applied pi calculus and ProVerif

B Blanchet - Foundations and Trends® in Privacy and …, 2016 - nowpublishers.com
ProVerif is an automatic symbolic protocol verifier. It supports a wide range of cryptographic
primitives, defined by rewrite rules or by equations. It can prove various security properties …

Timed automata as a formalism for expressing security: A survey on theory and practice

J Arcile, É André - ACM Computing Surveys, 2022 - dl.acm.org
Timed automata are a common formalism for the verification of concurrent systems subject to
timing constraints. They extend finite-state automata with clocks, that constrain the system …

An enhanced pairing-based authentication scheme for smart grid communications

TY Wu, YQ Lee, CM Chen, Y Tian… - Journal of Ambient …, 2021 - Springer
To ensure that messages can be securely transmitted between different entities in a smart
grid, many researchers have focused on authentication and key exchange schemes. Chen …

The 5G-AKA authentication protocol privacy

A Koutsos - 2019 IEEE European symposium on security and …, 2019 - ieeexplore.ieee.org
We study the 5G-AKA authentication protocol described in the 5G mobile communication
standards. This version of AKA tries to achieve a better privacy than the 3G and 4G versions …

{SAPIC+}: protocol verifiers of the world, unite!

V Cheval, C Jacomme, S Kremer… - 31st USENIX Security …, 2022 - usenix.org
Symbolic security protocol verifiers have reached a high degree of automation and maturity.
Today, experts can model real-world protocols, but this often requires model-specific …

Formal analysis of 5G EAP-TLS authentication protocol using proverif

J Zhang, L Yang, W Cao, Q Wang - IEEE access, 2020 - ieeexplore.ieee.org
As a critical component of the security architecture of 5G network, the authentication protocol
plays a role of the first safeguard in ensuring the communication security, such as the …

A comprehensive, formal and automated analysis of the {EDHOC} protocol

C Jacomme, E Klein, S Kremer… - 32nd USENIX Security …, 2023 - usenix.org
EDHOC is a key exchange proposed by IETF's Lightweight Authenticated Key Exchange
(LAKE) Working Group (WG). Its design focuses on small message sizes to be suitable for …

An interactive prover for protocol verification in the computational model

D Baelde, S Delaune, C Jacomme… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Given the central importance of designing secure protocols, providing solid mathematical
foundations and computer-assisted methods to attest for their correctness is becoming …

Journey beyond full abstraction: Exploring robust property preservation for secure compilation

C Abate, R Blanco, D Garg, C Hritcu… - 2019 IEEE 32nd …, 2019 - ieeexplore.ieee.org
Good programming languages provide helpful abstractions for writing secure code, but the
security properties of the source language are generally not preserved when compiling a …

An extensive formal analysis of multi-factor authentication protocols

C Jacomme, S Kremer - ACM Transactions on Privacy and Security …, 2021 - dl.acm.org
Passwords are still the most widespread means for authenticating users, even though they
have been shown to create huge security problems. This motivated the use of additional …