Communicating sequential processes
Communicating sequential processes
The Interrogator: Protocol Secuity Analysis
IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Cryptanalysis and protocol failures
Communications of the ACM
A classical mind
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
The Theory and Practice of Concurrency
The Theory and Practice of Concurrency
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
TACAs '96 Proceedings of the Second International Workshop on Tools and Algorithms for Construction and Analysis of Systems
Key Distribution Protocol for Digital Mobile Communication Systems
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Intensional specifications of security protocols
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
A Hierarchy of Authentication Specifications
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
Casper: A Compiler for the Analysis of Security Protocols
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
Automated analysis of cryptographic protocols using Mur/spl phi/
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
INATEST: an interactive environment for testing formal specifications
ACM SIGSOFT Software Engineering Notes - Proceedings of VERkshop III -- a formal verification workshop
Using the ASTRAL model checker to analyze mobile IP
Proceedings of the 21st international conference on Software engineering
An approach to the formal verification of the two-party cryptographic protocols
ACM SIGOPS Operating Systems Review
A compiler for analyzing cryptographic protocols using noninterference
ACM Transactions on Software Engineering and Methodology (TOSEM)
Using SMV for cryptographic protocol analysis: a case study
ACM SIGOPS Operating Systems Review
An approach to finding the attacks on the cryptographic protocols
ACM SIGOPS Operating Systems Review
Analysis of security protocols as open systems
Theoretical Computer Science
Soft Constraints for Security Protocol Analysis: Confidentiality
PADL '01 Proceedings of the Third International Symposium on Practical Aspects of Declarative Languages
Classification of Security Properties (Part I: Information Flow)
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Automatic Verification of Cryptographic Protocols through Compositional Analysis Techniques
TACAS '99 Proceedings of the 5th International Conference on Tools and Algorithms for Construction and Analysis of Systems
Analyzing Cryptographic Protocols in a Reactive Framework
VMCAI '02 Revised Papers from the Third International Workshop on Verification, Model Checking, and Abstract Interpretation
Analysing a Stream Authentication Protocol Using Model Checking
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
Three-Pass Hybrid Key Establishment Protocol Based on ESIGN Signature
SAFECOMP '99 Proceedings of the 18th International Conference on Computer Computer Safety, Reliability and Security
Formal Specification and Verification of Mobile Agent Data Integrity Properties: A Case Study
MA '01 Proceedings of the 5th International Conference on Mobile Agents
Automated Analysis of Some Security Mechanisms of SCEP
ISC '02 Proceedings of the 5th International Conference on Information Security
Abstracting Cryptographic Protocols with Tree Automata
SAS '99 Proceedings of the 6th International Symposium on Static Analysis
Combining Independent Specifications
FASE '01 Proceedings of the 4th International Conference on Fundamental Approaches to Software Engineering
Decision Procedures for the Analysis of Cryptographic Protocols by Logics of Belief
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Secure Composition of Insecure Components
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
CVS: A Compiler for the Analysis of Cryptographic Protocols
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Development of communication protocols using algebraic and temporal specifications
Computer Networks: The International Journal of Computer and Telecommunications Networking
Automatic testing equivalence verification of spi calculus specifications
ACM Transactions on Software Engineering and Methodology (TOSEM)
Availability of protocol goals
Proceedings of the 2003 ACM symposium on Applied computing
An approach to the formal verification of the three-principal cryptographic protocols
ACM SIGOPS Operating Systems Review
Modeling and verification of cryptographic protocols using coloured petri nets and design/CPN
Nordic Journal of Computing
Comparing BDD and SAT Based Techniques for Model Checking Chaum's Dining Cryptographers Protocol
Fundamenta Informaticae - SPECIAL ISSUE ON CONCURRENCY SPECIFICATION AND PROGRAMMING (CS&P 2005) Ruciane-Nide, Poland, 28-30 September 2005
A survey of algebraic properties used in cryptographic protocols
Journal of Computer Security
A formalism for visual security protocol modeling
Journal of Visual Languages and Computing
Verifying Security Protocols Modelled by Networks of Automata
Fundamenta Informaticae - Special Issue on Concurrency Specification and Programming (CS&P)
Formal security analysis of Australian e-passport implementation
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
SAT-Based Verification of Security Protocols Via Translation to Networks of Automata
Model Checking and Artificial Intelligence
Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project
Electronic Notes in Theoretical Computer Science (ENTCS)
The ρ-spi Calculus at Work: Authentication Case Studies
Electronic Notes in Theoretical Computer Science (ENTCS)
A Trace Logic for Local Security Properties
Electronic Notes in Theoretical Computer Science (ENTCS)
Is the verification problem for cryptographic protocols solved?
Proceedings of the 11th international conference on Security Protocols
Verifying a chipcard-based biometric identification protocol in VSE
SAFECOMP'06 Proceedings of the 25th international conference on Computer Safety, Reliability, and Security
Comparison of cryptographic verification tools dealing with algebraic properties
FAST'09 Proceedings of the 6th international conference on Formal Aspects in Security and Trust
Generic verification of security protocols
SPIN'05 Proceedings of the 12th international conference on Model Checking Software
FMOODS'10/FORTE'10 Proceedings of the 12th IFIP WG 6.1 international conference and 30th IFIP WG 6.1 international conference on Formal Techniques for Distributed Systems
Verifying security protocols: an application of CSP
CSP'04 Proceedings of the 2004 international conference on Communicating Sequential Processes: the First 25 Years
Proof and refutation in formal software development
IW-FM'99 Proceedings of the 3rd Irish conference on Formal Methods
Verification of security protocols using LOTOS-method and application
Computer Communications
Algebraic Framework for the Specification and Analysis of Cryptographic-Key Distribution
Fundamenta Informaticae
Verifying Security Protocols Modelled by Networks of Automata
Fundamenta Informaticae - Special Issue on Concurrency Specification and Programming (CS&P)
Comparing BDD and SAT Based Techniques for Model Checking Chaum's Dining Cryptographers Protocol
Fundamenta Informaticae - SPECIAL ISSUE ON CONCURRENCY SPECIFICATION AND PROGRAMMING (CS&P 2005) Ruciane-Nide, Poland, 28-30 September 2005
A systematic approach to embedded biomedical decision making
Computer Methods and Programs in Biomedicine
Approaches to modelling security scenarios with domain-specific languages
SP'12 Proceedings of the 20th international conference on Security Protocols
Asymmetric unification: a new unification paradigm for cryptographic protocol analysis
CADE'13 Proceedings of the 24th international conference on Automated Deduction
Hi-index | 0.00 |
In this paper we use FDR, a model checker for CSP, to detect errors in the TMN protocol [18]. We model the protocol and a very general intruder as CSP processes, and use the model checker to test whether the intruder can successfully attack the protocol. We consider three variants on the protocol, and discover a total of 10 different attacks leading to breaches of security.