2014
DOI: 10.1561/2500000001
|View full text |Cite
|
Sign up to set email alerts
|

Formal Models and Techniques for Analyzing Security Protocols: A Tutorial

Abstract: International audienceSecurity protocols are distributed programs that aim at securing communications by the means of cryptography. They are for instance used to secure electronic payments, home banking and more recently electronic elections. Given The financial and societal impact in case of failure, and the long history of design flaws in such protocol, formal verification is a necessity. A major difference from other safety critical systems is that the properties of security protocols must hold in the prese… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 79 publications
(114 reference statements)
0
8
0
Order By: Relevance
“…Indeed, research on security extensions to behavioral types (cf. the survey [2]) seems to have proceeded independently from approaches such as those overviewed in [7]. The work in [6] is similar in spirit to ours, but is different in conception and details, as it uses a session graph specification to generate a cryptographic functional implementation that enjoys session integrity.…”
Section: Related Work and Concluding Remarksmentioning
confidence: 99%
See 1 more Smart Citation
“…Indeed, research on security extensions to behavioral types (cf. the survey [2]) seems to have proceeded independently from approaches such as those overviewed in [7]. The work in [6] is similar in spirit to ours, but is different in conception and details, as it uses a session graph specification to generate a cryptographic functional implementation that enjoys session integrity.…”
Section: Related Work and Concluding Remarksmentioning
confidence: 99%
“…They are representative of two separate research strands: (a) Process models for security protocols, such as [12] (see also [7]), rely on variants of the applied π-calculus [1] to establish properties related to process execution (e.g., secrecy and confidentiality). These models support cryptography and term passing, but lack support for high-level communication structures.…”
Section: Introductionmentioning
confidence: 99%
“…In addition to type checkers and type systems, there are other tools and techniques that can be utilized for the formal analysis of security protocols, each has its own pros and cons [45,46]. The inductive method [47] is among the first solutions proposed to verify security protocols.…”
Section: Related Workmentioning
confidence: 99%
“…[15,27,34] The approach to secure such a complex system is the modelization of security protocols with formal languages, and of the security properties to be preserved with formal logics. This formalization effort allows us to produce automated techniques and tools that verify whether the protocols and their implementations respect the security requirements.…”
Section: Introductionmentioning
confidence: 99%