Formal Models and Techniques for Analyzing Security Protocols: A Tutorial

Véronique Cortier 1 Steve Kremer 1
1 CASSIS - Combination of approaches to the security of infinite states systems
FEMTO-ST - Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies, Inria Nancy - Grand Est, LORIA - FM - Department of Formal Methods
Abstract : Security protocols are distributed programs that aim at securing communications by the means of cryptography. They are for instance used to secure electronic payments, home banking and more recently electronic elections. Given The financial and societal impact in case of failure, and the long history of design flaws in such protocol, formal verification is a necessity. A major difference from other safety critical systems is that the properties of security protocols must hold in the presence of an arbitrary adversary. The aim of this paper is to provide a tutorial to some modern approaches for formally modeling protocols, their goals and automatically verifying them.
Type de document :
Article dans une revue
Foundations and Trends in Programming Languages, Now Publishers, 2014, 1 (3), pp.117. 〈10.1561/2500000001〉
Liste complète des métadonnées

Littérature citée [116 références]  Voir  Masquer  Télécharger

https://hal.inria.fr/hal-01090874
Contributeur : Steve Kremer <>
Soumis le : mardi 13 octobre 2015 - 15:00:16
Dernière modification le : jeudi 11 janvier 2018 - 06:24:26
Document(s) archivé(s) le : jeudi 27 avril 2017 - 00:28:45

Fichier

CK-fntpl-14.pdf
Fichiers produits par l'(les) auteur(s)

Identifiants

Citation

Véronique Cortier, Steve Kremer. Formal Models and Techniques for Analyzing Security Protocols: A Tutorial. Foundations and Trends in Programming Languages, Now Publishers, 2014, 1 (3), pp.117. 〈10.1561/2500000001〉. 〈hal-01090874〉

Partager

Métriques

Consultations de la notice

334

Téléchargements de fichiers

241