Using CSP to Detect Errors in the TMN Protocol
IEEE Transactions on Software Engineering
A probabilistic poly-time framework for protocol analysis
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Using the ASTRAL model checker to analyze mobile IP
Proceedings of the 21st international conference on Software engineering
An approach to the formal verification of the two-party cryptographic protocols
ACM SIGOPS Operating Systems Review
Programming language methods in computer security
POPL '01 Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Mobile values, new names, and secure communication
POPL '01 Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Verifying security protocols with Brutus
ACM Transactions on Software Engineering and Methodology (TOSEM)
A compiler for analyzing cryptographic protocols using noninterference
ACM Transactions on Software Engineering and Methodology (TOSEM)
Using SMV for cryptographic protocol analysis: a case study
ACM SIGOPS Operating Systems Review
Transformations for model checking distributed Java programs
SPIN '01 Proceedings of the 8th international SPIN workshop on Model checking of software
Automatic Analysis of Consistency between Requirements and Designs
IEEE Transactions on Software Engineering
Verifying security protocols as planning in logic programming
ACM Transactions on Computational Logic (TOCL) - Special issue devoted to Robert A. Kowalski
An approach to finding the attacks on the cryptographic protocols
ACM SIGOPS Operating Systems Review
Experimenting with STA, a tool for automatic analysis of security protocols
Proceedings of the 2002 ACM symposium on Applied computing
A conservative algorithm for computing the flow of permissions in Java programs
ISSTA '02 Proceedings of the 2002 ACM SIGSOFT international symposium on Software testing and analysis
Primitives for authentication in process algebras
Theoretical Computer Science
Finite-state analysis of two contract signing protocols
Theoretical Computer Science
Mark, a Reasoning Kit for Mobility
Automated Software Engineering
Logical Cryptanalysis as a SAT Problem
Journal of Automated Reasoning
On the symbolic reduction of processes with cryptographic functions
Theoretical Computer Science
Analysis of security protocols as open systems
Theoretical Computer Science
An attack-finding algorithm for security protocols
Journal of Computer Science and Technology
A new logic for electronic commerce protocols
Theoretical Computer Science - Special issue: Algebraic methodology and software technology
Probabilistic Polynomial-Time Process Calculus and Security Protocol Analysis
ESOP '01 Proceedings of the 10th European Symposium on Programming Languages and Systems
Specifying Authentication Protocols Using Rewriting and Strategies
PADL '01 Proceedings of the Third International Symposium on Practical Aspects of Declarative Languages
Using SPIN to Verify Security Properties of Cryptographic Protocols
Proceedings of the 9th International SPIN Workshop on Model Checking of Software
Planning Attacks to Security Protocols: Case Studies in Logic Programming
Computational Logic: Logic Programming and Beyond, Essays in Honour of Robert A. Kowalski, Part I
Classification of Security Properties (Part I: Information Flow)
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Analysis of a Security Protocol in µCRL
ICFEM '02 Proceedings of the 4th International Conference on Formal Engineering Methods: Formal Methods and Software Engineering
An Intelligent Intruder Model for Security Protocol Analysis
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Partial Order Reductions for Security Protocol Verification
TACAS '00 Proceedings of the 6th International Conference on Tools and Algorithms for Construction and Analysis of Systems: Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS 2000
Analyzing Cryptographic Protocols in a Reactive Framework
VMCAI '02 Revised Papers from the Third International Workshop on Verification, Model Checking, and Abstract Interpretation
On the Reachability Problem in Cryptographic Protocols
CONCUR '00 Proceedings of the 11th International Conference on Concurrency Theory
A Framework for the Analysis of Security Protocols
CONCUR '02 Proceedings of the 13th International Conference on Concurrency Theory
On the Decidability of Cryptographic Protocols with Open-Ended Data Structures
CONCUR '02 Proceedings of the 13th International Conference on Concurrency Theory
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
CVS at Work: A Report on New Failures upon Some Cryptographic Protocols
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Security Protocols and Specifications
FoSSaCS '99 Proceedings of the Second International Conference on Foundations of Software Science and Computation Structure, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS'99
Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols
LOPSTR '01 Selected papers from the 11th International Workshop on Logic Based Program Synthesis and Transformation
An Improved Constraint-Based System for the Verification of Security Protocols
SAS '02 Proceedings of the 9th International Symposium on Static Analysis
Multiset Rewriting and Security Protocol Analysis
RTA '02 Proceedings of the 13th International Conference on Rewriting Techniques and Applications
Protocol Engineering Applied to Formal Analysis of Security Systems
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)
TCS '00 Proceedings of the International Conference IFIP on Theoretical Computer Science, Exploring New Frontiers of Theoretical Informatics
Analysis of Abuse-Free Contract Signing
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Probabilistic Polynomial-Time Equivalence and Security Analysis
FM '99 Proceedings of the Wold Congress on Formal Methods in the Development of Computing Systems-Volume I - Volume I
AGVI - Automatic Generation, Verification, and Implementation of Security Protocols
CAV '01 Proceedings of the 13th International Conference on Computer Aided Verification
Abstracting Cryptographic Protocols with Tree Automata
SAS '99 Proceedings of the 6th International Symposium on Static Analysis
Handbook of automated reasoning
Decision Procedures for the Analysis of Cryptographic Protocols by Logics of Belief
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
A Meta-Notation for Protocol Analysis
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Athena: a New Efficient Automatic Checker for Security Protocol Analysis
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Authentication via Localized Names
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
A Formal Framework and Evaluation Method for Network Denial of Service
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
A Formal Analysis of Some Properties of Kerberos 5 Using MSR
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Probabilistic Analysis of Anonymity
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Specifying and Verifying Hardware for Tamper-Resistant Software
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Source-Level Transformations for Improved Formal Verification
ICCD '00 Proceedings of the 2000 IEEE International Conference on Computer Design: VLSI in Computers & Processors
A Tool for Lazy Verification of Security Protocols
Proceedings of the 16th IEEE international conference on Automated software engineering
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Protocol Insecurity with Finite Number of Sessions is NP-Complete
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Computing Symbolic Models for Verifying Cryptographic Protocols
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
A Compositional Logic for Protocol Correctness
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
A composable cryptographic library with nested operations
Proceedings of the 10th ACM conference on Computer and communications security
CDiff: a new reduction technique for constraint-based analysis of security protocols
Proceedings of the 10th ACM conference on Computer and communications security
A compositional logic for proving security properties of protocols
Journal of Computer Security - Special issue on CSFW14
Using backward strategy to the Needham-Schroeder public key protocol verification
Artificial intelligence and security in computing systems
Strategy for Verifying Security Protocols with Unbounded Message Size
Automated Software Engineering
An approach to the formal verification of the three-principal cryptographic protocols
ACM SIGOPS Operating Systems Review
Proceedings of the 2003 workshop on New security paradigms
Soft constraint programming to analysing security protocols
Theory and Practice of Logic Programming
Multiset rewriting and the complexity of bounded security protocols
Journal of Computer Security
Analysis of the 802.11i 4-way handshake
Proceedings of the 3rd ACM workshop on Wireless security
Specifying Kerberos 5 cross-realm authentication
WITS '05 Proceedings of the 2005 workshop on Issues in the theory of security
WITS '05 Proceedings of the 2005 workshop on Issues in the theory of security
Security analysis of network protocols: logical and computational methods
PPDP '05 Proceedings of the 7th ACM SIGPLAN international conference on Principles and practice of declarative programming
A method for symbolic analysis of security protocols
Theoretical Computer Science
Authentication primitives for secure protocol specifications
Future Generation Computer Systems - Special issue: Parallel computing technologies
A modular correctness proof of IEEE 802.11i and TLS
Proceedings of the 12th ACM conference on Computer and communications security
Symmetry in temporal logic model checking
ACM Computing Surveys (CSUR)
A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols
Theoretical Computer Science
Modeling and verification of cryptographic protocols using coloured petri nets and design/CPN
Nordic Journal of Computing
Static validation of security protocols
Journal of Computer Security
A derivation system and compositional logic for security protocols
Journal of Computer Security
Deriving the type flaw attacks in the Otway-Rees protocol by rewriting
Nordic Journal of Computing - Selected papers of the 17th nordic workshop on programming theory (NWPT'05), October 19-21, 2005
Understanding the intruder through attacks on cryptographic protocols
Proceedings of the 44th annual Southeast regional conference
Weakening the perfect encryption assumption in Dolev-Yao adversaries
Theoretical Computer Science - Theoretical foundations of security analysis and design II
Improving the security of industrial networks by means of formal verification
Computer Standards & Interfaces
Theoretical Computer Science - Automated reasoning for security protocol analysis
Protocol Composition Logic (PCL)
Electronic Notes in Theoretical Computer Science (ENTCS)
A Quantifier-free First-order Knowledge Logic of Authentication
Fundamenta Informaticae - SPECIAL ISSUE ON CONCURRENCY SPECIFICATION AND PROGRAMMING (CS&P 2005) Ruciane-Nide, Poland, 28-30 September 2005
Higher-Order and Symbolic Computation
A survey of algebraic properties used in cryptographic protocols
Journal of Computer Security
Finite-state analysis of SSL 3.0
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Temporal Logics of Knowledge and their Applications in Security
Electronic Notes in Theoretical Computer Science (ENTCS)
Simulation Based Validation Of Authentication Protocols
Journal of Integrated Design & Process Science
Probabilistic analysis of an anonymity system
Journal of Computer Security - Special issue on CSFW15
Perfect cryptography, S5 knowledge, and algorithmic knowledge
TARK '07 Proceedings of the 11th conference on Theoretical aspects of rationality and knowledge
Automatic verification of cryptographic protocols in first-order logic
ICAI'07 Proceedings of the 8th Conference on 8th WSEAS International Conference on Automation and Information - Volume 8
Verifying Security Protocols Modelled by Networks of Automata
Fundamenta Informaticae - Special Issue on Concurrency Specification and Programming (CS&P)
Formal security analysis of Australian e-passport implementation
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
SAT-Based Verification of Security Protocols Via Translation to Networks of Automata
Model Checking and Artificial Intelligence
25 Years of Model Checking
Implementing Spi Calculus Using Nominal Techniques
CiE '08 Proceedings of the 4th conference on Computability in Europe: Logic and Theory of Algorithms
Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets
PETRI NETS '08 Proceedings of the 29th international conference on Applications and Theory of Petri Nets
Composable Formal Security Analysis: Juggling Soundness, Simplicity and Efficiency
ICALP '08 Proceedings of the 35th international colloquium on Automata, Languages and Programming, Part II
Determining a parallel session attack on a key distribution protocol using a model checker
Proceedings of the 6th International Conference on Advances in Mobile Computing and Multimedia
Model checking nash equilibria in MAD distributed systems
Proceedings of the 2008 International Conference on Formal Methods in Computer-Aided Design
Rewriting Techniques in the Constraint Solver
Electronic Notes in Theoretical Computer Science (ENTCS)
Tools for cryptographic protocols analysis: A technical and experimental comparison
Computer Standards & Interfaces
Comparing State Spaces in Automatic Security Protocol Analysis
Formal to Practical Security
Automatic verification of correspondences for security protocols
Journal of Computer Security
From qualitative to quantitative proofs of security properties using first-order conditional logic
AAAI'08 Proceedings of the 23rd national conference on Artificial intelligence - Volume 1
A Graphical User Interface for Maude-NPA
Electronic Notes in Theoretical Computer Science (ENTCS)
Analysing the BKE-security Protocol with μCRL
Electronic Notes in Theoretical Computer Science (ENTCS)
Formalizing and Analyzing the Needham-Schroeder Symmetric-Key Protocol by Rewriting
Electronic Notes in Theoretical Computer Science (ENTCS)
Rule-based Programming in Java For Protocol Verification
Electronic Notes in Theoretical Computer Science (ENTCS)
Tags for Multi-Protocol Authentication
Electronic Notes in Theoretical Computer Science (ENTCS)
The ρ-spi Calculus at Work: Authentication Case Studies
Electronic Notes in Theoretical Computer Science (ENTCS)
A Trace Logic for Local Security Properties
Electronic Notes in Theoretical Computer Science (ENTCS)
Automated Security Protocol Analysis With the AVISPA Tool
Electronic Notes in Theoretical Computer Science (ENTCS)
Santa Claus: Formal analysis of a process-oriented solution
ACM Transactions on Programming Languages and Systems (TOPLAS)
Approximation-based tree regular model-checking
Nordic Journal of Computing
Looking at a class of RFID APs through GNY logic
International Journal of Security and Networks
Applying SDL to formal analysis of security systems
SDL'03 Proceedings of the 11th international conference on System design
Compiling and verifying security protocols
LPAR'00 Proceedings of the 7th international conference on Logic for programming and automated reasoning
Verification of authentication protocols based on the binding relation
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Analysis of EAP-GPSK authentication protocol
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Journal of Computer Security - Digital Identity Management (DIM 2007)
A protocol's life after attacks...
Proceedings of the 11th international conference on Security Protocols
Verifying a chipcard-based biometric identification protocol in VSE
SAFECOMP'06 Proceedings of the 25th international conference on Computer Safety, Reliability, and Security
Common program analysis of two-party security protocols using SMV
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
SeVe: automatic tool for verification of security protocols
Frontiers of Computer Science in China
Comparison of cryptographic verification tools dealing with algebraic properties
FAST'09 Proceedings of the 6th international conference on Formal Aspects in Security and Trust
Justifying a dolev-yao model under active attacks
Foundations of Security Analysis and Design III
Static analysis of authentication
Foundations of Security Analysis and Design III
Formal security analysis of Ariadne secure routing protocol using model checking
International Journal of Ad Hoc and Ubiquitous Computing
Model checking for nominal calculi
FOSSACS'05 Proceedings of the 8th international conference on Foundations of Software Science and Computation Structures
Generic verification of security protocols
SPIN'05 Proceedings of the 12th international conference on Model Checking Software
Browser model for security analysis of browser-based protocols
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Computational soundness, co-induction, and encryption cycles
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
FMOODS'10/FORTE'10 Proceedings of the 12th IFIP WG 6.1 international conference and 30th IFIP WG 6.1 international conference on Formal Techniques for Distributed Systems
Universally composable symbolic analysis of mutual authentication and key-exchange protocols
TCC'06 Proceedings of the Third conference on Theory of Cryptography
Evaluation technique in the spicalculus for cryptographic protocols
ISIICT'09 Proceedings of the Third international conference on Innovation and Information and Communication Technology
Security protocol verification: symbolic and computational models
POST'12 Proceedings of the First international conference on Principles of Security and Trust
Verifying Security Protocols Modelled by Networks of Automata
Fundamenta Informaticae - Special Issue on Concurrency Specification and Programming (CS&P)
A Quantifier-free First-order Knowledge Logic of Authentication
Fundamenta Informaticae - SPECIAL ISSUE ON CONCURRENCY SPECIFICATION AND PROGRAMMING (CS&P 2005) Ruciane-Nide, Poland, 28-30 September 2005
Intrusion attack tactics for the model checking of e-commerce security guarantees
SAFECOMP'07 Proceedings of the 26th international conference on Computer Safety, Reliability, and Security
Security Verification of Hardware-enabled Attestation Protocols
MICROW '12 Proceedings of the 2012 45th Annual IEEE/ACM International Symposium on Microarchitecture Workshops
An empirical study of cryptographic misuse in android applications
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Finding security vulnerabilities in a network protocol using parameterized systems
CAV'13 Proceedings of the 25th international conference on Computer Aided Verification
Fast automatic security protocol generation
Journal of Computer Security
From Qualitative to Quantitative Proofs of Security Properties Using First-Order Conditional Logic
LICS '13 Proceedings of the 2013 28th Annual ACM/IEEE Symposium on Logic in Computer Science
Hi-index | 0.01 |
Abstract: A methodology is presented for using a general-purpose state enumeration tool, Mur/spl phi/, to analyze cryptographic and security-related protocols. We illustrate the feasibility of the approach by analyzing the Needham-Schroeder (1978) protocol, finding a known bug in a few seconds of computation time, and analyzing variants of Kerberos and the faulty TMN protocol used in another comparative study. The efficiency of Mur/spl phi/ also allows us to examine multiple terms of relatively short protocols, giving us the ability to detect replay attacks, or errors resulting from confusion between independent execution of a protocol by independent parties.