SoK: Computer-aided cryptography

M Barbosa, G Barthe, K Bhargavan… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Computer-aided cryptography is an active area of research that develops and applies
formal, machine-checkable approaches to the design, analysis, and implementation of …

{SAPIC+}: protocol verifiers of the world, unite!

V Cheval, C Jacomme, S Kremer… - 31st USENIX Security …, 2022 - usenix.org
Symbolic security protocol verifiers have reached a high degree of automation and maturity.
Today, experts can model real-world protocols, but this often requires model-specific …

Formal model-driven discovery of bluetooth protocol design vulnerabilities

J Wu, R Wu, D Xu, DJ Tian… - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
The Bluetooth protocol suite, including Bluetooth Classic, Bluetooth Low Energy, and
Bluetooth Mesh, has become the de facto standard for short-range wireless …

A comprehensive, formal and automated analysis of the {EDHOC} protocol

C Jacomme, E Klein, S Kremer… - 32nd USENIX Security …, 2023 - usenix.org
EDHOC is a key exchange proposed by IETF's Lightweight Authenticated Key Exchange
(LAKE) Working Group (WG). Its design focuses on small message sizes to be suitable for …

Dy fuzzing: formal Dolev-Yao models meet cryptographic protocol fuzz testing

M Ammann, L Hirschi, S Kremer - 2024 IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Critical and widely used cryptographic protocols have repeatedly been found to contain
flaws in their design and their implementation. A prominent class of such vulnerabilities is …

Verifpal: Cryptographic protocol analysis for the real world

N Kobeissi, G Nicolas, M Tiwari - … on Cryptology in India, Bangalore, India …, 2020 - Springer
Verifpal is a new automated modeling framework and verifier for cryptographic protocols,
optimized with heuristics for common-case protocol specifications, that aims to work better …

[PDF][PDF] Extrapolating Formal Analysis to Uncover Attacks in Bluetooth Passkey Entry Pairing.

MK Jangid, Y Zhang, Z Lin - NDSS, 2023 - ndss-symposium.org
Bluetooth is a leading wireless communication technology used by billions of Internet of
Things (IoT) devices today. Its ubiquity demands systematic security scrutiny. A key …

A formal analysis of the FIDO2 protocols

J Guan, H Li, H Ye, Z Zhao - European Symposium on Research in …, 2022 - Springer
FIDO2 is the latest member of the Fast IDentity Online (FIDO) protocol suite, which aims at
providing unified password-less authentication across the web. We present a formal security …

A formal analysis of IKEv2's post-quantum extension

SL Gazdag, S Grundner-Culemann… - Proceedings of the 37th …, 2021 - dl.acm.org
Many security protocols used for daily Internet traffic have been used for decades and
standardization bodies like the IETF often provide extensions for legacy protocols to deal …

A generic methodology for the modular verification of security protocol implementations

L Arquint, M Schwerhoff, V Mehta, P Müller - Proceedings of the 2023 …, 2023 - dl.acm.org
Security protocols are essential building blocks of modern IT systems. Subtle flaws in their
design or implementation may compromise the security of entire systems. It is, thus …