Efficient and timely mutual authentication
ACM SIGOPS Operating Systems Review
Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
A calculus for cryptographic protocols
Information and Computation
AGVI - Automatic Generation, Verification, and Implementation of Security Protocols
CAV '01 Proceedings of the 13th International Conference on Computer Aided Verification
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Automatic testing equivalence verification of spi calculus specifications
ACM Transactions on Software Engineering and Methodology (TOSEM)
Lightweight Bytecode Verification
Journal of Automated Reasoning
Spi2Java: Automatic Cryptographic Protocol Java Code Generation from spi calculus
AINA '04 Proceedings of the 18th International Conference on Advanced Information Networking and Applications - Volume 2
Analyzing security protocols with secrecy types and logic programs
Journal of the ACM (JACM)
Automatic Generation of the C# Code for Security Protocols Verified with Casper/FDR
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 2
Static validation of security protocols
Journal of Computer Security
The Definitive ANTLR Reference: Building Domain-Specific Languages
The Definitive ANTLR Reference: Building Domain-Specific Languages
On the security of public key protocols
SFCS '81 Proceedings of the 22nd Annual Symposium on Foundations of Computer Science
A Security Protocol Compiler Generating C Source Codes
ISA '08 Proceedings of the 2008 International Conference on Information Security and Assurance (isa 2008)
Verified interoperable implementations of security protocols
ACM Transactions on Programming Languages and Systems (TOPLAS)
Hi-index | 0.00 |
Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and all necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation of communication protocols. With it, partners can suggest a new protocol by sending its specification. After formally verifying the specification, each partner generates an implementation, which can then be used for establishing communication. We also present a practical realisation of the Protocol Implementation Generator framework based on the LySatool and a translator from the LySa language into C or Java.