Formal verification of security protocol implementations: a survey (original) (raw)

Approaches to Formal Verification of Security Protocols

Mohit Jain

Computing Research Repository, 2011

View PDFchevron_right

Security protocols from the software verification perspective

Aleksy Schubert

mimuw.edu.pl

View PDFchevron_right

Combining Theory Generation and Model Checking for Security Protocol Analysis

Jeannette Wing

View PDFchevron_right

Automated Formal Methods for Security Protocol Engineering

Riccardo Sisto

Systems and Methodologies, 2012

View PDFchevron_right

Formal automatic verification of authentication cryptographic protocols

Nadia Tawbi

Proceedings First IEEE International Conference on Formal Engineering Methods, 1997

View PDFchevron_right

HERMES: An Automatic Tool for Verification of Secrecy in Security Protocols

Yassine Lakhnech

Lecture Notes in Computer Science, 2003

View PDFchevron_right

AnBx: Automatic Generation and Verification of Security Protocols Implementations

Paolo Modesti

FPS2015: Foundations and Practice of Security, 2016

View PDFchevron_right

Model Checking for Security Protocols

W. Marrero

View PDFchevron_right

Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach

Nadim Kobeissi

2017 IEEE European Symposium on Security and Privacy (EuroS&P), 2017

View PDFchevron_right

Automated Logic-Based Technique for Formal Verification of Security Protocols

Anca Delia Jurcut

Journal of Advances in Computer Networks, 2018

View PDFchevron_right

FORMAL VERIFICATION TECHNIQUES FOR COMPUTER COMMUNICATION SECURITY PROTOCOLS

bimam bref

View PDFchevron_right

Generic Verification of Security Protocols

Sahid Khan

Lecture Notes in Computer Science, 2005

View PDFchevron_right

Formal Methods for Assuring Security of Protocols

Shiu-Kai Chin

The Computer Journal, 2002

View PDFchevron_right

Proving Security Protocols Correct

Lawrence Paulson

1999

View PDFchevron_right

Formal verification of cryptographic software implementations

brenda vieira

2012

View PDFchevron_right

Verified Security Protocol Modeling and Implementation with AnBx

Paolo Modesti

2012

View PDFchevron_right

Automated Reasoning for Security Protocol Analysis

Jorge Cuellar

Journal of Automated Reasoning, 2006

View PDFchevron_right

Specifying and Verifying Crypto-Protocols at the Design Level

Elvinia Riccobene

2007

View PDFchevron_right

Automatic Generation of Security Protocols Implementations (Extended Abstract)

Paolo Modesti

View PDFchevron_right

Computationally Sound, Automated Proofs for Security Protocols

Bogdan Warinschi

Lecture Notes in Computer Science, 2005

View PDFchevron_right

A new method of verification of security protocols

Andrew Mironov

Cornell University - arXiv, 2017

View PDFchevron_right

From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap ⋆

Alessio Merlo

2013

View PDFchevron_right

Static validation of security protocols

Abadi Nrl

Journal of Computer Security, 2005

View PDFchevron_right

Verification of security protocols using LOTOS-method and application

Guy Leduc

Computer Communications, 2000

View PDFchevron_right

Formal Support to Security Protocol Development: A Survey

Raúl Monroy

Computación y Sistemas, 2008

View PDFchevron_right

A Methodology for Protocol Verification

Leo Freitas

2018

View PDFchevron_right

Towards Producing Formally Checkable Security Proofs, Automatically

Jean Goubault-larrecq

2008 21st IEEE Computer Security Foundations Symposium, 2008

View PDFchevron_right

Verifying security protocols with Brutus

W. Marrero

ACM Transactions on Software Engineering and Methodology, 2000

View PDFchevron_right

An IDE for the Design, Verification and Implementation of Security Protocols

Paolo Modesti

IEEE International Symposium on Software Reliability Engineering Workshops , 2017

View PDFchevron_right