Composition theorems for CryptoVerif and application to TLS 1.3

B Blanchet - 2018 IEEE 31st Computer Security Foundations …, 2018 - ieeexplore.ieee.org
We present composition theorems for security protocols, to compose a key exchange
protocol and a symmetric-key protocol that uses the exchanged key. Our results rely on the …

Stateful protocol composition in Isabelle/HOL

AV Hess, SA Mödersheim, AD Brucker - ACM Transactions on Privacy …, 2023 - dl.acm.org
Communication networks like the Internet form a large distributed system where a huge
number of components run in parallel, such as security protocols and distributed web …

Stateful protocol composition

AV Hess, SA Mödersheim, AD Brucker - European Symposium on …, 2018 - Springer
We prove a parallel compositionality result for protocols with a shared mutable state, ie,
stateful protocols. For protocols satisfying certain compositionality conditions our result …

Secure composition of PKIs with public key protocols

V Cheval, V Cortier, B Warinschi - 2017 IEEE 30th Computer …, 2017 - ieeexplore.ieee.org
We use symbolic formal models to study the composition of public key-based protocols with
public key infrastructures (PKIs). We put forth a minimal set of requirements which a PKI …

Symbolic models for isolated execution environments

C Jacomme, S Kremer, G Scerri - 2017 IEEE European …, 2017 - ieeexplore.ieee.org
Isolated Execution Environments (IEEs), such as ARM TrustZone and Intel SGX, offer the
possibility to execute sensitive code in isolation from other malicious programs, running on …

Typing and Compositionality for Stateful Security Protocols

AV Hess - 2019 - orbit.dtu.dk
Typing and Compositionality for Stateful Security Protocols — Welcome to DTU Research
Database Skip to main navigation Skip to search Skip to main content Welcome to DTU …

Typing messages for free in security protocols

R Chrétien, V Cortier, A Dallon, S Delaune - ACM Transactions On …, 2019 - dl.acm.org
Security properties of cryptographic protocols are typically expressed as reachability or
equivalence properties. Secrecy and authentication are examples of reachability properties …

Modular verification of protocol equivalence in the presence of randomness

MS Bauer, R Chadha, M Viswanathan - … 11-15, 2017, Proceedings, Part I …, 2017 - Springer
Security protocols that provide privacy and anonymity guarantees are growing increasingly
prevalent in the online world. The highly intricate nature of these protocols makes them …

Composing protocols with randomized actions

MS Bauer, R Chadha, M Viswanathan - … on Principles of Security and Trust, 2016 - Springer
Recently, several composition results have been established, showing that two
cryptographic protocols proven secure against a Dolev-Yao attacker continue to afford the …

Formal analysis of a ttp-free blacklistable anonymous credentials system

W Wang, J Liu, Y Qin, D Feng - … , ICICS 2017, Beijing, China, December 6 …, 2018 - Springer
This paper firstly introduces a novel security definition for BLAC-like schemes (BLAC
represents TTP-free BLacklistable Anonymous Credentials) in symbolic model using applied …