Scyther: Semantics and verification of security protocols

CJF Cremers - 2006 - research.tue.nl
Recent technologies have cleared the way for large scale application of electronic
communication. The open and distributed nature of these communications implies that the …

Unbounded verification, falsification, and characterization of security protocols by pattern refinement

CJF Cremers - Proceedings of the 15th ACM conference on Computer …, 2008 - dl.acm.org
We present a new verification algorithm for security protocols that allows for unbounded
verification, falsification, and complete characterization. The algorithm provides a number of …

A framework for compositional verification of security protocols

S Andova, C Cremers, K Gjøsteen, S Mauw… - Information and …, 2008 - Elsevier
Automatic security protocol analysis is currently feasible only for small protocols. Since
larger protocols quite often are composed of many small protocols, compositional analysis is …

A type system for privacy properties

V Cortier, N Grimm, J Lallemand, M Maffei - Proceedings of the 2017 …, 2017 - dl.acm.org
Mature push button tools have emerged for checking trace properties (eg secrecy or
authentication) of security protocols. The case of indistinguishability-based privacy …

A type discipline for authorization in distributed systems

C Fournet, A Gordon, S Maffeis - 20th IEEE Computer Security …, 2007 - ieeexplore.ieee.org
We consider the problem of statically verifying the conformance of the code of a system to an
explicit authorization policy. In a distributed setting, some part of the system may be …

Type-based verification of electronic voting protocols

V Cortier, F Eigner, S Kremer, M Maffei… - … 2015, Held as Part of the …, 2015 - Springer
E-voting protocols aim at achieving a wide range of sophisticated security properties and,
consequently, commonly employ advanced cryptographic primitives. This makes their …

Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations

M Backes, C Hriţcu, M Maffei - Journal of Computer Security, 2014 - content.iospress.com
We present a new type system for verifying the security of reference implementations of
cryptographic protocols written in a core functional programming language. The type system …

Differential privacy by typing in security protocols

F Eigner, M Maffei - 2013 IEEE 26th Computer Security …, 2013 - ieeexplore.ieee.org
Differential privacy is a confidentiality property for database queries which allows for the
release of statistical information about the content of a database without disclosing personal …

Security and privacy by declarative design

M Maffei, K Pecina, M Reinert - 2013 IEEE 26th Computer …, 2013 - ieeexplore.ieee.org
The privacy of users has rapidly become one of the most pervasive and stringent
requirements in distributed computing. Designing and implementing privacy-preserving …

Secrecy despite compromise: Types, cryptography, and the pi-calculus

AD Gordon, A Jeffrey - International Conference on Concurrency Theory, 2005 - Springer
A realistic threat model for cryptographic protocols or for language-based security should
include a dynamically growing population of principals (or security levels), some of which …