Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security 2018
DOI: 10.1145/3190619.3190640
|View full text |Cite
|
Sign up to set email alerts
|

Formal verification of the W3C web authentication protocol

Abstract: The science of security can be set on rm foundations via the formal veri cation of protocols. New protocols can have their design validated in a mechanized manner for security aws, allowing protocol designs to be scienti cally compared in a neutral manner. Given that these techniques have discovered critical aws in protocols such as TLS 1.2 and are now being used to re-design protocols such as TLS 1.3, we demonstrate how formal veri cation can be used to analyze new protocols such as the W3C Web Authentication… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
16
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(16 citation statements)
references
References 25 publications
0
16
0
Order By: Relevance
“…In a study that was conducted by [11], the science behind the establishment of security systems could be established based on rm grounds of formal protocols of veri cation. There are new protocols that could have their designs being validated in a manner that is more mechanized to ensure that they are in sole positions of dealing with possible security aws [11].…”
Section: A Security Keysmentioning
confidence: 99%
See 4 more Smart Citations
“…In a study that was conducted by [11], the science behind the establishment of security systems could be established based on rm grounds of formal protocols of veri cation. There are new protocols that could have their designs being validated in a manner that is more mechanized to ensure that they are in sole positions of dealing with possible security aws [11].…”
Section: A Security Keysmentioning
confidence: 99%
“…In a study that was conducted by [11], the science behind the establishment of security systems could be established based on rm grounds of formal protocols of veri cation. There are new protocols that could have their designs being validated in a manner that is more mechanized to ensure that they are in sole positions of dealing with possible security aws [11]. One of the core risks that has been compromising the effectiveness of security of current information systems is the ability of different groups of users to create and subsequently utilize high-entropy passwords that are unique to speci c domains.…”
Section: A Security Keysmentioning
confidence: 99%
See 3 more Smart Citations