2014
DOI: 10.1007/s00165-012-0269-9
|View full text |Cite
|
Sign up to set email alerts
|

Formal verification of security protocol implementations: a survey

Abstract: Automated formal verification of security protocols has been mostly focused on analyzing highlevel abstract models which, however, are significantly different from real protocol implementations written in programming languages. Recently, some researchers have started investigating techniques that bring automated formal proofs closer to real implementations. This paper surveys these attempts, focusing on approaches that target the application code that implements protocol logic, rather than the libraries that i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
35
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 52 publications
(39 citation statements)
references
References 76 publications
0
35
0
Order By: Relevance
“…Those tools seem to be mostly academic; a commercial one is VISUALETHER PROTOCOL ANALYZER 7.0 13 , which uses the output of Wireshark (a network protocol analyzer) to generate sequence and callflow diagrams. Avalle et al [14] survey state-of-the-art research aimed at automatically getting formal security proofs of models close to the source code of real protocol-logic implementations. They comment extensively on work that extracts models to further validate widely deployed existing protocol implementations written in C (rather than libraries as in our case), limited to a subset of the language.…”
Section: Related Tools and Approachesmentioning
confidence: 99%
“…Those tools seem to be mostly academic; a commercial one is VISUALETHER PROTOCOL ANALYZER 7.0 13 , which uses the output of Wireshark (a network protocol analyzer) to generate sequence and callflow diagrams. Avalle et al [14] survey state-of-the-art research aimed at automatically getting formal security proofs of models close to the source code of real protocol-logic implementations. They comment extensively on work that extracts models to further validate widely deployed existing protocol implementations written in C (rather than libraries as in our case), limited to a subset of the language.…”
Section: Related Tools and Approachesmentioning
confidence: 99%
“…A few e-mails were just blatantly rude. Upon investigating one of the complaints in depth it was discovered that there was a bug in the dovecot mail server that caused a sub-process of the software to crash 7 . This bug was fixed by the software maintainers shortly after notification.…”
Section: Ethical Issuesmentioning
confidence: 99%
“…Security protocols play a key role in protecting communications and user's digital assets, but evidence shows [1] that despite considerable efforts, their implementation remains challenging and error-prone. In fact, low-level implementation bugs that need to be manually patched, are discovered even in ubiquitous protocols like TLS and SSH which are thoroughly tested.…”
Section: Introductionmentioning
confidence: 99%