Formal Models and Techniques for Analyzing Security Protocols: A Tutorial

Véronique Cortier 1 Steve Kremer 1
1 CASSIS - Combination of approaches to the security of infinite states systems
FEMTO-ST - Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174), Inria Nancy - Grand Est, LORIA - FM - Department of Formal Methods
Abstract : Security protocols are distributed programs that aim at securing communications by the means of cryptography. They are for instance used to secure electronic payments, home banking and more recently electronic elections. Given The financial and societal impact in case of failure, and the long history of design flaws in such protocol, formal verification is a necessity. A major difference from other safety critical systems is that the properties of security protocols must hold in the presence of an arbitrary adversary. The aim of this paper is to provide a tutorial to some modern approaches for formally modeling protocols, their goals and automatically verifying them.
Document type :
Journal articles
Complete list of metadatas

Cited literature [116 references]  Display  Hide  Download

https://hal.inria.fr/hal-01090874
Contributor : Steve Kremer <>
Submitted on : Tuesday, October 13, 2015 - 3:00:16 PM
Last modification on : Tuesday, December 18, 2018 - 4:38:25 PM
Long-term archiving on : Thursday, April 27, 2017 - 12:28:45 AM

File

CK-fntpl-14.pdf
Files produced by the author(s)

Identifiers

Citation

Véronique Cortier, Steve Kremer. Formal Models and Techniques for Analyzing Security Protocols: A Tutorial. Foundations and Trends in Programming Languages, Now Publishers, 2014, 1 (3), pp.117. ⟨10.1561/2500000001⟩. ⟨hal-01090874⟩

Share

Metrics

Record views

523

Files downloads

917