Towards the automated verification of cyber-physical security protocols: Bounding the number of timed intruders

V Nigam, C Talcott, A Aires Urquiza - … 26-30, 2016, Proceedings, Part II 21, 2016 - Springer
Abstract Timed Intruder Models have been proposed for the verification of Cyber-Physical
Security Protocols (CPSP) amending the traditional Dolev-Yao intruder to obey the physical …

Strand spaces with choice via a process algebra semantics

F Yang, S Escobar, C Meadows, J Meseguer… - Proceedings of the 18th …, 2016 - dl.acm.org
Roles in cryptographic protocols do not always have a linear execution, but may include
choice points causing the protocol to continue along different paths. In this paper we …

Formal verification of the YubiKey and YubiHSM APIs in Maude-NPA

A González-Burgueño, D Aparicio, S Escobar… - arXiv preprint arXiv …, 2018 - arxiv.org
In this paper, we perform an automated analysis of two devices developed by Yubico:
YubiKey, designed to authenticate a user to network-based services, and YubiHSM, Yubicos …

Modeling and analysis of advanced cryptographic primitives and security protocols in maude-npa

D Aparicio Sánchez - 2022 - riunet.upv.es
[EN] The Maude-NPA crypto tool is a specialized model checker for cryptographic security
protocols that take into account the algebraic properties of the cryptosystem. In the literature …

Modular verification of sequential composition for private channels in Maude-NPA

F Yang, S Escobar, C Meadows, J Meseguer - International Workshop on …, 2018 - Springer
This paper gives a modular verification methodology in which, given parametric
specifications of a key establishment protocol P and a protocol Q providing private channel …

Maude-NPA and formal analysis of protocols with equational theories

C Meadows, S Escobar… - Engineering Secure and …, 2019 - ebooks.iospress.nl
This paper describes the latest version (3. x) of the Maude-NRL Protocol Analyzer (Maude-
NPA), a tool for the analysis of cryptographic protocols that provides support for equational …

Extending the language and applications of Maude-NPA through rewriting semantics

F Yang - 2019 - ideals.illinois.edu
Formal methods have been used in analyzing cryptographic protocols since the 1980's.
Formal analysis of cryptographic protocols involves properties that are generally …