A formal analysis of 5G authentication

D Basin, J Dreier, L Hirschi, S Radomirovic… - Proceedings of the …, 2018 - dl.acm.org
Mobile communication networks connect much of the world's population. The security of
users' calls, SMSs, and mobile data depends on the guarantees provided by the …

Modeling and verifying security protocols with the applied pi calculus and ProVerif

B Blanchet - Foundations and Trends® in Privacy and …, 2016 - nowpublishers.com
ProVerif is an automatic symbolic protocol verifier. It supports a wide range of cryptographic
primitives, defined by rewrite rules or by equations. It can prove various security properties …

SoK: Computer-aided cryptography

M Barbosa, G Barthe, K Bhargavan… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Computer-aided cryptography is an active area of research that develops and applies
formal, machine-checkable approaches to the design, analysis, and implementation of …

The applied pi calculus: Mobile values, new names, and secure communication

M Abadi, B Blanchet, C Fournet - Journal of the ACM (JACM), 2017 - dl.acm.org
We study the interaction of the programming construct “new,” which generates statically
scoped names, with communication via messages on channels. This interaction is crucial in …

zkay: Specifying and enforcing data privacy in smart contracts

S Steffen, B Bichsel, M Gersbach, N Melchior… - Proceedings of the …, 2019 - dl.acm.org
Privacy concerns of smart contracts are a major roadblock preventing their wider adoption. A
promising approach to protect private data is hiding it with cryptographic primitives and then …

{SAPIC+}: protocol verifiers of the world, unite!

V Cheval, C Jacomme, S Kremer… - 31st USENIX Security …, 2022 - usenix.org
Symbolic security protocol verifiers have reached a high degree of automation and maturity.
Today, experts can model real-world protocols, but this often requires model-specific …

An interactive prover for protocol verification in the computational model

D Baelde, S Delaune, C Jacomme… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Given the central importance of designing secure protocols, providing solid mathematical
foundations and computer-assisted methods to attest for their correctness is becoming …

{Privacy-Preserving} and {Standard-Compatible}{AKA} Protocol for 5G

Y Wang, Z Zhang, Y Xie - 30th USENIX Security Symposium (USENIX …, 2021 - usenix.org
The 3GPP consortium has published the Authentication and Key Agreement protocol for the
5th generation (5G) mobile communication system (ie, 5G-AKA) by Technical Specification …

DEEPSEC: deciding equivalence properties in security protocols theory and practice

V Cheval, S Kremer… - 2018 IEEE symposium on …, 2018 - ieeexplore.ieee.org
Automated verification has become an essential part in the security evaluation of
cryptographic protocols. Recently, there has been a considerable effort to lift the theory and …

: A Modular Symbolic Verification Framework for Executable Cryptographic Protocol Code

K Bhargavan, A Bichhawat, QH Do… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
We present DY^⋆, a new formal verification framework for the symbolic security analysis of
cryptographic protocol code written in the F^⋆ programming language. Unlike automated …