Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security 2014
DOI: 10.1145/2660267.2660349
|View full text |Cite
|
Sign up to set email alerts
|

Mechanized Network Origin and Path Authenticity Proofs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
1

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 20 publications
(16 citation statements)
references
References 39 publications
0
15
1
Order By: Relevance
“…Zhang et al [20] prove source authentication and path validation properties of the OPT packet forwarding protocols [35]. These properties differ from those that we study here.…”
Section: B Verification Of Secure Data Plane Protocolscontrasting
confidence: 77%
See 1 more Smart Citation
“…Zhang et al [20] prove source authentication and path validation properties of the OPT packet forwarding protocols [35]. These properties differ from those that we study here.…”
Section: B Verification Of Secure Data Plane Protocolscontrasting
confidence: 77%
“…Since path-aware Internet architectures and path authoriza- tion are relatively new concepts, there is little existing verification work. The most closely related works are the verification of a weaker AS-local form of path authorization [19] and of different security properties [20] for such architectures. Both of these works mechanize their proofs in Coq using a nonfoundational approach, i.e., relying on an axiomatization or external tools.…”
Section: Introductionmentioning
confidence: 99%
“…OPT's (Origin and Path Trace) [48] security properties have been formally verified using the Coq interactive theorem prover in [49]. Isabelle is used to give a mechanized proof of the Basic Perturbation Lemma in [50] and to verify the correctness of Warren Abstract Machine (WAM) in [51].…”
Section: Application Of Toolsmentioning
confidence: 99%
“…The security properties of chained MACs with respect to path validation have been formalized and verified for a decentralized setting [23]. The centralized control in SDN simplifies key management, since the controller sets up the shared symmetric keys with the switches; sophisticated key-establishment protocols are not needed.…”
Section: Path Deviation Attacksmentioning
confidence: 99%