Verifying policy-based security for web services
Proceedings of the 11th ACM conference on Computer and communications security
Verifying policy-based web services security
ACM Transactions on Programming Languages and Systems (TOPLAS)
Verified interoperable implementations of security protocols
ACM Transactions on Programming Languages and Systems (TOPLAS)
Tiddle: a trace description language for generating concurrent benchmarks to test dynamic analyses
WODA '09 Proceedings of the Seventh International Workshop on Dynamic Analysis
Formally based semi-automatic implementation of an open security protocol
Journal of Systems and Software
Security protocol verification: symbolic and computational models
POST'12 Proceedings of the First international conference on Principles of Security and Trust
NFM'12 Proceedings of the 4th international conference on NASA Formal Methods
Protocol implementation generator
NordSec'10 Proceedings of the 15th Nordic conference on Information Security Technology for Applications
Proceedings of the 2012 ACM conference on Computer and communications security
Using SMT solvers to automate design tasks for encryption and signature schemes
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Hi-index | 0.00 |
The aim of this work is to describe a tool (Spi2Java)that automatically generates Java code implementing cryptographic protocols described in the formal specificationlanguage spi calculus. Spi2Java is part of a set of tools forspi calculus, also including a pre-processor, a parser, and asecurity analyzer. The latter can formally analyze protocolsand detect protocol flaws. When a protocol has been analyzed and an adequate confidence about its correctness hasbeen reached, Spi2Java can generate a corresponding correct Java implementation of the protocol, thus dramaticallyreducing the risk of introducing security flaws in the codingphase.