2008 21st IEEE Computer Security Foundations Symposium 2008
DOI: 10.1109/csf.2008.21
|View full text |Cite
|
Sign up to set email alerts
|

Towards Producing Formally Checkable Security Proofs, Automatically

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
22
1

Year Published

2009
2009
2013
2013

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 15 publications
(23 citation statements)
references
References 64 publications
0
22
1
Order By: Relevance
“…In contrast, our work, which is closer to the first kind of approach, shows that this proof generation procedure does indeed work in practice for many protocols, comparable to the results of [16]. We see the main benefit of our approach in the fact that we can indeed use the output of established verification tools dedicated to the domain of security protocols.…”
Section: Related and Future Workcontrasting
confidence: 42%
See 3 more Smart Citations
“…In contrast, our work, which is closer to the first kind of approach, shows that this proof generation procedure does indeed work in practice for many protocols, comparable to the results of [16]. We see the main benefit of our approach in the fact that we can indeed use the output of established verification tools dedicated to the domain of security protocols.…”
Section: Related and Future Workcontrasting
confidence: 42%
“…We see the main benefit of our approach in the fact that we can indeed use the output of established verification tools dedicated to the domain of security protocols. However, note that the work of [16] and ours have some major differences which makes results hard to compare. First, we consider a reference model where the protocol is modeled as a set of traces; the generated proofs are with respect to this reference model and all abstractions are merely part of the automatic tools.…”
Section: Related and Future Workmentioning
confidence: 89%
See 2 more Smart Citations
“…As a result, sequences of games can sometimes be inferred automatically; yet, at the same time, the connection between CryptoVerif proofs and standard cryptographic proofs is not as strong as one would desire. Finally, CryptoVerif in its current form acts more like a proof engine than a proof checker, and thus does not comply with the objective of verifiable security-see however [17] for preliminary work on certifying successful runs of CryptoVerif. Courant et al [14] have also developed an automated prover for proving asymptotic security of encryption schemes based on one-way functions.…”
Section: Related Workmentioning
confidence: 99%