A formal analysis of 5G authentication

D Basin, J Dreier, L Hirschi, S Radomirovic… - Proceedings of the …, 2018 - dl.acm.org
Mobile communication networks connect much of the world's population. The security of
users' calls, SMSs, and mobile data depends on the guarantees provided by the …

New privacy threat on 3G, 4G, and upcoming 5G AKA protocols

R Borgaonkar, L Hirschi, S Park, A Shaik - Cryptology ePrint Archive, 2018 - eprint.iacr.org
Mobile communications are used by more than two-thirds of the world population who
expect security and privacy guarantees. The 3rd Generation Partnership Project (3GPP) …

{Privacy-Preserving} and {Standard-Compatible}{AKA} Protocol for 5G

Y Wang, Z Zhang, Y Xie - 30th USENIX Security Symposium (USENIX …, 2021 - usenix.org
The 3GPP consortium has published the Authentication and Key Agreement protocol for the
5th generation (5G) mobile communication system (ie, 5G-AKA) by Technical Specification …

: A Modular Symbolic Verification Framework for Executable Cryptographic Protocol Code

K Bhargavan, A Bichhawat, QH Do… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
We present DY^⋆, a new formal verification framework for the symbolic security analysis of
cryptographic protocol code written in the F^⋆ programming language. Unlike automated …

Modern and Lightweight Component-based Symmetric Cipher Algorithms

SA Qassir, MT Gaata, AT Sadiq - ARO-The Scientific …, 2022 - eprints.koyauniversity.org
Information security, being one of the corner stones of network and communication
technology, has been evolving tremendously to cope with the parallel evolution of network …

Automatic generation of sources lemmas in Tamarin: Towards automatic proofs of security protocols 1

V Cortier, S Delaune, J Dreier… - Journal of Computer …, 2022 - content.iospress.com
Tamarin is a popular tool dedicated to the formal analysis of security protocols. One major
strength of the tool is that it offers an interactive mode, allowing to go beyond what push …

A method for proving unlinkability of stateful protocols

D Baelde, S Delaune, S Moreau - 2020 IEEE 33rd Computer …, 2020 - ieeexplore.ieee.org
The rise of contactless and wireless devices such as mobile phones and RFID chips justifies
significant concerns over privacy, and calls for communication protocols that ensure some …

Subterm-based proof techniques for improving the automation and scope of security protocol analysis

C Cremers, C Jacomme, P Lukert - 2023 IEEE 36th Computer …, 2023 - ieeexplore.ieee.org
During the last decades, many advances in the field of automated security protocol analysis
have seen the field mature and grow from being applicable to toy examples, to modeling …

Formal analysis of EDHOC key establishment for constrained IoT devices

K Norrman, V Sundararajan, A Bruni - arXiv preprint arXiv:2007.11427, 2020 - arxiv.org
Constrained IoT devices are becoming ubiquitous in society and there is a need for secure
communication protocols that respect the constraints under which these devices operate …

A method for unbounded verification of privacy-type properties

L Hirschi, D Baelde, S Delaune - Journal of Computer Security, 2019 - content.iospress.com
In this paper, we consider the problem of verifying anonymity and unlinkability in the
symbolic model, where protocols are represented as processes in a variant of the applied pi …