Automated Logic-Based Technique for Formal Verification of Security Protocols (original) (raw)
Related papers
Establishing and Fixing Security Protocols Weaknesses Using a Logic-based Verification Tool
Journal of Communications, 2013
From protocol specifications to flaws and attack scenarios: an automatic and formal algorithm
Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
IEEE Transactions on Dependable and Secure Computing, 2017
Introducing ASPECT 1 - a tool for checking protocol security
2002
Automated Reasoning for Security Protocol Analysis
Journal of Automated Reasoning, 2006
Automatic Generation of Security Protocols Attacks Specifications and Implementations
Cybersecurity and Applications, 2024
On the Automated Correction of Faulty Security Protocols
Citeseer
A Comparative study of Security Protocols Validation Tools: HERMES vs. AVISPA
Model Checking for Security Protocols
Security protocols from the software verification perspective
mimuw.edu.pl
A new method of verification of security protocols
Cornell University - arXiv, 2017
A Security Analysis Method for Security Protocol Implementations Based on Message Construction
Applied Sciences, 2018
1997
Automated Design of Security Protocols
Computational Intelligence, 2004
Planning Attacks to Security Protocols: Case Studies in Logic Programming
Lecture Notes in Computer Science, 2002
From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap ⋆
2013
Automated Formal Methods for Security Protocol Engineering
Systems and Methodologies, 2012
An IDE for the Design, Verification and Implementation of Security Protocols
IEEE International Symposium on Software Reliability Engineering Workshops , 2017
Formal automatic verification of authentication cryptographic protocols
Proceedings First IEEE International Conference on Formal Engineering Methods, 1997
Combining Theory Generation and Model Checking for Security Protocol Analysis
On the Automated Correction of Security Protocols Susceptible to a Replay Attack
European Symposium on Research in Computer Security, 2007
Analysing Security Protocols Using Refinement in iUML-B
Lecture Notes in Computer Science, 2017
Formal Support to Security Protocol Development: A Survey
Computación y Sistemas, 2008
Design of an Efficient Security Protocol Analyzer
2007
AnBx: Automatic Generation and Verification of Security Protocols Implementations
FPS2015: Foundations and Practice of Security, 2016
Static validation of security protocols
Journal of Computer Security, 2005
Dynamic analysis of security protocols
Proceedings of the 2000 Workshop on New Security Paradigms, 2001
Proving Security Protocols Correct
1999
2008
Simulation of Security Protocols based on Scenarios of Attacks
2009
A logic for constraint-based security protocol analysis
Security and Privacy, 2006 IEEE …, 2006
Approaches to Formal Verification of Security Protocols
Computing Research Repository, 2011
Formally analysing a security protocol for replay attacks
Australian Software Engineering Conference (ASWEC'06), 2006
Automatic Generation of Security Protocols Implementations (Extended Abstract)
Formal verification of security protocol implementations: a survey