PROCOMET '98 Proceedings of the IFIP TC2/WG2.2,2.3 International Conference on Programming Concepts and Methods
Athena: a New Efficient Automatic Checker for Security Protocol Analysis
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
CSFW '00 Proceedings of the 13th IEEE workshop on Computer Security Foundations
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
Automated analysis of cryptographic protocols using Mur/spl phi/
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Model Checking Driven Heuristic Search for Correct Programs
Model Checking and Artificial Intelligence
Towards a framework for autonomic security protocols
Proceedings of the 11th international conference on Security Protocols
Formally based semi-automatic implementation of an open security protocol
Journal of Systems and Software
Experiments on the automatic evolution of protocols using genetic programming
WAC'05 Proceedings of the Second international IFIP conference on Autonomic Communication
Security protocol verification: symbolic and computational models
POST'12 Proceedings of the First international conference on Principles of Security and Trust
NFM'12 Proceedings of the 4th international conference on NASA Formal Methods
Protocol implementation generator
NordSec'10 Proceedings of the 15th Nordic conference on Information Security Technology for Applications
Proceedings of the 2012 ACM conference on Computer and communications security
JavaSPI: A Framework for Security Protocol Implementation
International Journal of Secure Software Engineering
Using SMT solvers to automate design tasks for encryption and signature schemes
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Hi-index | 0.00 |
As new Internet applications emerge, new security protocols and systems need to be designed and implemented. Unfortunately the current protocol design and implementation process is often ad-hoc and error prone. To solve this problem, we have designed and implemented a toolkit AGVI, Automatic Generation, Verification, and Implementation of Security Protocols. With AGVI, the protocol designer inputs the system specification (such as cryptographic key setup) and security requirements. AGVI will then automatically find the near-optimal protocols for the specific application, proves the correctness of the protocols and implement the protocols in Java. Our experiments have successfully generated new and even simpler protocols than the ones documented in the literature.