Modeling and verifying security protocols with the applied pi calculus and ProVerif

B Blanchet - Foundations and Trends® in Privacy and …, 2016 - nowpublishers.com
ProVerif is an automatic symbolic protocol verifier. It supports a wide range of cryptographic
primitives, defined by rewrite rules or by equations. It can prove various security properties …

SoK: Computer-aided cryptography

M Barbosa, G Barthe, K Bhargavan… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Computer-aided cryptography is an active area of research that develops and applies
formal, machine-checkable approaches to the design, analysis, and implementation of …

Verified models and reference implementations for the TLS 1.3 standard candidate

K Bhargavan, B Blanchet… - 2017 IEEE Symposium on …, 2017 - ieeexplore.ieee.org
TLS 1.3 is the next version of the Transport Layer Security (TLS) protocol. Its clean-slate
design is a reaction both to the increasing demand for low-latency HTTPS connections and …

Applying formal methods to networking: theory, techniques, and applications

J Qadir, O Hasan - IEEE Communications Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Despite its great importance, modern network infrastructure is remarkable for the lack of rigor
in its engineering. The Internet, which began as a research experiment, was never designed …

[PDF][PDF] Modelling and automatically analysing privacy properties for honest-but-curious adversaries

A Paverd, A Martin, I Brown - Tech. Rep, 2014 - ajpaverd.org
For certain communication protocols, undetectability and unlinkability of messages or
information items are desirable properties, and are used to reason about anonymity and …

Automatic verification of security protocols in the symbolic model: The verifier proverif

B Blanchet - International School on Foundations of Security …, 2012 - Springer
After giving general context on the verification of security protocols, we focus on the
automatic symbolic protocol verifier ProVerif. This verifier can prove secrecy, authentication …

Owl: Compositional verification of security protocols via an information-flow type system

J Gancher, S Gibson, P Singh… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Computationally sound protocol verification tools promise to deliver full-strength
cryptographic proofs for security protocols. Unfortunately, current tools lack either modularity …

A mechanised cryptographic proof of the WireGuard virtual private network protocol

B Lipp, B Blanchet, K Bhargavan - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
WireGuard is a free and open source Virtual Private Network (VPN) that aims to replace
IPsec and OpenVPN. It is based on a new cryptographic protocol derived from the Noise …

: A Modular Symbolic Verification Framework for Executable Cryptographic Protocol Code

K Bhargavan, A Bichhawat, QH Do… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
We present DY^⋆, a new formal verification framework for the symbolic security analysis of
cryptographic protocol code written in the F^⋆ programming language. Unlike automated …

A model-based approach for vulnerability analysis of IoT security protocols: The Z-Wave case study

C Braghin, M Lilli, E Riccobene - Computers & Security, 2023 - Elsevier
Abstract IoT (Internet of Things) devices are extensively used in security-critical services, as
for example home door opening, gas monitoring, alarm systems, etc. Often, they use …