A compiler for analyzing cryptographic protocols using noninterference
ACM Transactions on Software Engineering and Methodology (TOSEM)
Dynamic analysis of security protocols
Proceedings of the 2000 workshop on New security paradigms
Verifying security protocols as planning in logic programming
ACM Transactions on Computational Logic (TOCL) - Special issue devoted to Robert A. Kowalski
Security analysis of the cliques protocols suites: first results
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Automated protocol verification in linear logic
Proceedings of the 4th ACM SIGPLAN international conference on Principles and practice of declarative programming
Specifying Authentication Protocols Using Rewriting and Strategies
PADL '01 Proceedings of the Third International Symposium on Practical Aspects of Declarative Languages
Planning Attacks to Security Protocols: Case Studies in Logic Programming
Computational Logic: Logic Programming and Beyond, Essays in Honour of Robert A. Kowalski, Part I
Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning
FORTE '02 Proceedings of the 22nd IFIP WG 6.1 International Conference Houston on Formal Techniques for Networked and Distributed Systems
Classification of Security Properties (Part I: Information Flow)
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Making Sense of Specifications: The Formalization of SET
Revised Papers from the 8th International Workshop on Security Protocols
The AVISS Security Protocol Analysis Tool
CAV '02 Proceedings of the 14th International Conference on Computer Aided Verification
SET Cardholder Registration: The Secrecy Proofs
IJCAR '01 Proceedings of the First International Joint Conference on Automated Reasoning
Protocol insecurity with a finite number of sessions and composed keys is NP-complete
Theoretical Computer Science
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Capturing Parallel Attacks within the Data Independence Framework
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
A Tool for Lazy Verification of Security Protocols
Proceedings of the 16th IEEE international conference on Automated software engineering
A Security Analysis of the Cliques Protocols Suites
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Protocol Insecurity with Finite Number of Sessions is NP-Complete
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
CDiff: a new reduction technique for constraint-based analysis of security protocols
Proceedings of the 10th ACM conference on Computer and communications security
Some attacks upon authenticated group key agreement protocols
Journal of Computer Security - Special issue on CSFW14
Strategy for Verifying Security Protocols with Unbounded Message Size
Automated Software Engineering
ACM SIGACT News
Failure modelling in software architecture design for safety
WADS '05 Proceedings of the 2005 workshop on Architecting dependable systems
CONCUR 2005 - Concurrency Theory
Information and Computation
On the semantics of Alice&Bob specifications of security protocols
Theoretical Computer Science - Automated reasoning for security protocol analysis
Embedding agents within the intruder to detect parallel attacks
Journal of Computer Security - Special issue on CSFW15
A formal semantics for protocol narrations
Theoretical Computer Science
Perfect cryptography, S5 knowledge, and algorithmic knowledge
TARK '07 Proceedings of the 11th conference on Theoretical aspects of rationality and knowledge
Modelling and Checking Timed Authentication of Security Protocols
Fundamenta Informaticae - Special Issue on Concurrency Specification and Programming (CS&P)
Verifying Security Protocols Modelled by Networks of Automata
Fundamenta Informaticae - Special Issue on Concurrency Specification and Programming (CS&P)
SAT-Based Verification of Security Protocols Via Translation to Networks of Automata
Model Checking and Artificial Intelligence
Modelling secure wireless sensor networks routing protocols with timed automata
Proceedings of the 3nd ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks
Probing the Depths of CSP-M: A New fdr-Compliant Validation Tool
ICFEM '08 Proceedings of the 10th International Conference on Formal Methods and Software Engineering
Determining a parallel session attack on a key distribution protocol using a model checker
Proceedings of the 6th International Conference on Advances in Mobile Computing and Multimedia
Verification of Security Protocols
VMCAI '09 Proceedings of the 10th International Conference on Verification, Model Checking, and Abstract Interpretation
Goal-Equivalent Secure Business Process Re-engineering
Service-Oriented Computing - ICSOC 2007 Workshops
Comparing State Spaces in Automatic Security Protocol Analysis
Formal to Practical Security
Timed Automata Based Model Checking of Timed Security Protocols
Fundamenta Informaticae - Concurrency Specification and Programming (CS&P)
Probabilistic and nondeterministic aspects of anonymity
Theoretical Computer Science
Compiling and securing cryptographic protocols
Information Processing Letters
Electronic Notes in Theoretical Computer Science (ENTCS)
Towards an Independent Semantics and Verification Technology for the HLPSL Specification Language
Electronic Notes in Theoretical Computer Science (ENTCS)
Automated Security Protocol Analysis With the AVISPA Tool
Electronic Notes in Theoretical Computer Science (ENTCS)
On the Relationship Between Web Services Security and Traditional Protocols
Electronic Notes in Theoretical Computer Science (ENTCS)
Compiling and verifying security protocols
LPAR'00 Proceedings of the 7th international conference on Logic for programming and automated reasoning
Data access specification and the most powerful symbolic attacker in MSR
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Integrating verification, testing, and learning for cryptographic protocols
IFM'07 Proceedings of the 6th international conference on Integrated formal methods
Is your security protocol on time?
FSEN'07 Proceedings of the 2007 international conference on Fundamentals of software engineering
A probabilistic applied pi-calculus
APLAS'07 Proceedings of the 5th Asian conference on Programming languages and systems
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Journal of Computer Security - Digital Identity Management (DIM 2007)
Modelling watermark communication protocols using the CASPER modelling language
Proceedings of the 12th ACM workshop on Multimedia and security
Abstraction by set-membership: verifying security protocols and web services with databases
Proceedings of the 17th ACM conference on Computer and communications security
Automated refinement of security protocols
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
A formal semantics for protocol narrations
TGC'05 Proceedings of the 1st international conference on Trustworthy global computing
Automated analysis of infinite scenarios
TGC'05 Proceedings of the 1st international conference on Trustworthy global computing
Distributed temporal logic for the analysis of security protocol models
Theoretical Computer Science
Application-binding protocol in the user centric smart card ownership model
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
Verifying a chipcard-based biometric identification protocol in VSE
SAFECOMP'06 Proceedings of the 25th international conference on Computer Safety, Reliability, and Security
LPAR'05 Proceedings of the 12th international conference on Logic for Programming, Artificial Intelligence, and Reasoning
SeVe: automatic tool for verification of security protocols
Frontiers of Computer Science in China
Comparison of cryptographic verification tools dealing with algebraic properties
FAST'09 Proceedings of the 6th international conference on Formal Aspects in Security and Trust
For-LySa: UML for authentication analysis
GC'04 Proceedings of the 2004 IST/FET international conference on Global Computing
Formally based semi-automatic implementation of an open security protocol
Journal of Systems and Software
Generic verification of security protocols
SPIN'05 Proceedings of the 12th international conference on Model Checking Software
Application of formal methods to the analysis of web services security
EPEW'05/WS-FM'05 Proceedings of the 2005 international conference on European Performance Engineering, and Web Services and Formal Methods, international conference on Formal Techniques for Computer Systems and Business Processes
An abstract model of a trusted platform
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Verifying security protocols: an application of CSP
CSP'04 Proceedings of the 2004 international conference on Communicating Sequential Processes: the First 25 Years
SAT-solving in CSP trace refinement
Science of Computer Programming
Insider attacks and privacy of RFID protocols
EuroPKI'11 Proceedings of the 8th European conference on Public Key Infrastructures, Services, and Applications
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Timed Automata Based Model Checking of Timed Security Protocols
Fundamenta Informaticae - Concurrency Specification and Programming (CS&P)
Modelling and Checking Timed Authentication of Security Protocols
Fundamenta Informaticae - Special Issue on Concurrency Specification and Programming (CS&P)
Verifying Security Protocols Modelled by Networks of Automata
Fundamenta Informaticae - Special Issue on Concurrency Specification and Programming (CS&P)
Proceedings of the 2012 ACM conference on Computer and communications security
Security Analysis of Standards-Driven Communication Protocols for Healthcare Scenarios
Journal of Medical Systems
Attacks on Confidentiality of Communications Between Stranger Organizations
International Journal of Knowledge-Based Organizations
Hi-index | 0.00 |
In recent years, a method for analyzing security protocols usingthe process algebra CSP (Hoare, 1985) and its model checker FDR(Roscoe, 1994) has been developed. This technique has provedremarkably successful, and has been used to discover a number ofattacks upon protocols. However, the technique has requiredproducing a CSP description of the protocol by hand; thishas proved tedious and error-prone. In this paper we describeCasper, a program that automatically produces the CSP descriptionfrom a more abstract description, thus greatly simplifying themodelling and analysis process.