Formal verification of security protocol implementations: a survey (original) (raw)
Related papers
Approaches to Formal Verification of Security Protocols
Computing Research Repository, 2011
Security protocols from the software verification perspective
mimuw.edu.pl
Combining Theory Generation and Model Checking for Security Protocol Analysis
Automated Formal Methods for Security Protocol Engineering
Systems and Methodologies, 2012
Formal automatic verification of authentication cryptographic protocols
Proceedings First IEEE International Conference on Formal Engineering Methods, 1997
HERMES: An Automatic Tool for Verification of Secrecy in Security Protocols
Lecture Notes in Computer Science, 2003
AnBx: Automatic Generation and Verification of Security Protocols Implementations
FPS2015: Foundations and Practice of Security, 2016
Model Checking for Security Protocols
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 2017
Automated Logic-Based Technique for Formal Verification of Security Protocols
Journal of Advances in Computer Networks, 2018
FORMAL VERIFICATION TECHNIQUES FOR COMPUTER COMMUNICATION SECURITY PROTOCOLS
Generic Verification of Security Protocols
Lecture Notes in Computer Science, 2005
Formal Methods for Assuring Security of Protocols
The Computer Journal, 2002
Proving Security Protocols Correct
1999
Formal verification of cryptographic software implementations
2012
Verified Security Protocol Modeling and Implementation with AnBx
2012
Automated Reasoning for Security Protocol Analysis
Journal of Automated Reasoning, 2006
Specifying and Verifying Crypto-Protocols at the Design Level
2007
Automatic Generation of Security Protocols Implementations (Extended Abstract)
Computationally Sound, Automated Proofs for Security Protocols
Lecture Notes in Computer Science, 2005
A new method of verification of security protocols
Cornell University - arXiv, 2017
From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap ⋆
2013
Static validation of security protocols
Journal of Computer Security, 2005
Verification of security protocols using LOTOS-method and application
Computer Communications, 2000
Formal Support to Security Protocol Development: A Survey
Computación y Sistemas, 2008
A Methodology for Protocol Verification
2018
Towards Producing Formally Checkable Security Proofs, Automatically
2008 21st IEEE Computer Security Foundations Symposium, 2008
Verifying security protocols with Brutus
ACM Transactions on Software Engineering and Methodology, 2000
An IDE for the Design, Verification and Implementation of Security Protocols
IEEE International Symposium on Software Reliability Engineering Workshops , 2017