Automated Logic-Based Technique for Formal Verification of Security Protocols (original) (raw)

Establishing and Fixing Security Protocols Weaknesses Using a Logic-based Verification Tool

Anca Delia Jurcut

Journal of Communications, 2013

View PDFchevron_right

From protocol specifications to flaws and attack scenarios: an automatic and formal algorithm

Nadia Tawbi

Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises

View PDFchevron_right

A Novel Security Protocol Attack Detection Logic with Unique Fault Discovery Capability for Freshness Attacks and Interleaving Session Attacks

Anca Delia Jurcut

IEEE Transactions on Dependable and Secure Computing, 2017

View PDFchevron_right

Introducing ASPECT 1 - a tool for checking protocol security

Brian Monahan

2002

View PDFchevron_right

Automated Reasoning for Security Protocol Analysis

Jorge Cuellar

Journal of Automated Reasoning, 2006

View PDFchevron_right

Automatic Generation of Security Protocols Attacks Specifications and Implementations

Paolo Modesti

Cybersecurity and Applications, 2024

View PDFchevron_right

On the Automated Correction of Faulty Security Protocols

Dieter Hutter, Raul Monroy

Citeseer

View PDFchevron_right

A Comparative study of Security Protocols Validation Tools: HERMES vs. AVISPA

nala Zaied

View PDFchevron_right

Model Checking for Security Protocols

W. Marrero

View PDFchevron_right

Security protocols from the software verification perspective

Aleksy Schubert

mimuw.edu.pl

View PDFchevron_right

A new method of verification of security protocols

Andrew Mironov

Cornell University - arXiv, 2017

View PDFchevron_right

A Security Analysis Method for Security Protocol Implementations Based on Message Construction

Chin-Tser Huang

Applied Sciences, 2018

View PDFchevron_right

A new algorithm for the automatic verification of authentication protocols: From specifications to ˉaws and attack scenarios

Mohamed amine Mejri

1997

View PDFchevron_right

Automated Design of Security Protocols

John Clark

Computational Intelligence, 2004

View PDFchevron_right

Planning Attacks to Security Protocols: Case Studies in Logic Programming

Luigia Aiello

Lecture Notes in Computer Science, 2002

View PDFchevron_right

From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap ⋆

Alessio Merlo

2013

View PDFchevron_right

Automated Formal Methods for Security Protocol Engineering

Riccardo Sisto

Systems and Methodologies, 2012

View PDFchevron_right

An IDE for the Design, Verification and Implementation of Security Protocols

Paolo Modesti

IEEE International Symposium on Software Reliability Engineering Workshops , 2017

View PDFchevron_right

Formal automatic verification of authentication cryptographic protocols

Nadia Tawbi

Proceedings First IEEE International Conference on Formal Engineering Methods, 1997

View PDFchevron_right

Combining Theory Generation and Model Checking for Security Protocol Analysis

Jeannette Wing

View PDFchevron_right

On the Automated Correction of Security Protocols Susceptible to a Replay Attack

Dieter Hutter

European Symposium on Research in Computer Security, 2007

View PDFchevron_right

Analysing Security Protocols Using Refinement in iUML-B

Thai Son Hoang

Lecture Notes in Computer Science, 2017

View PDFchevron_right

Formal Support to Security Protocol Development: A Survey

Raúl Monroy

Computación y Sistemas, 2008

View PDFchevron_right

Design of an Efficient Security Protocol Analyzer

Shinsaku Kiyomoto

2007

View PDFchevron_right

AnBx: Automatic Generation and Verification of Security Protocols Implementations

Paolo Modesti

FPS2015: Foundations and Practice of Security, 2016

View PDFchevron_right

Static validation of security protocols

Abadi Nrl

Journal of Computer Security, 2005

View PDFchevron_right

Dynamic analysis of security protocols

Alec Yasinsac

Proceedings of the 2000 Workshop on New Security Paradigms, 2001

View PDFchevron_right

Proving Security Protocols Correct

Lawrence Paulson

1999

View PDFchevron_right

Formal Support to Security Protocol Development: A Survey Soporte Formal para el Desarrollo de Protocolos de Seguridad: una Visión General

Raul Monroy

2008

View PDFchevron_right

Simulation of Security Protocols based on Scenarios of Attacks

Wojciech Penczek

2009

View PDFchevron_right

A logic for constraint-based security protocol analysis

Ari Saptawijaya

Security and Privacy, 2006 IEEE …, 2006

View PDFchevron_right

Approaches to Formal Verification of Security Protocols

Mohit Jain

Computing Research Repository, 2011

View PDFchevron_right

Formally analysing a security protocol for replay attacks

Benjamin Long

Australian Software Engineering Conference (ASWEC'06), 2006

View PDFchevron_right

Automatic Generation of Security Protocols Implementations (Extended Abstract)

Paolo Modesti

View PDFchevron_right

Formal verification of security protocol implementations: a survey

Ajeje Brazorf

View PDFchevron_right