Automated Verification Of Cryptographic Protocol Implementations

被引:0
|
作者
Babenko, Liudmila [1 ]
Pisarev, Ilya [1 ]
机构
[1] Southern Fed Univ, Informat Technol Secur Dept, Taganrog, Russia
关键词
verification; parser; translator; dynamic analysis; formal verification; cryptographic protocols; model;
D O I
10.1109/DeSE.2019.00157
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
When implementing systems using a secure data connection between components, it is important to analyze the security of data transmission. Secure data transfer is achieved by using cryptographic protocols. It is important to verify the security of cryptographic protocols already implemented in the system, since this is the last iteration of their compilation in the form of their implementation in the selected progranuning language. The paper proposes a scheme and approaches for creating an automated security verifier of cryptographic protocol implementations. The problems that arise when implementing cryptographic protocols in progranuning languages are described. A verification scheme based on the use of a source code analyzer for extracting the structure of cryptographic protocols, translating their structure of the Alice-Bob format protocol into the specification language for formal verifiers, and dynamic analysis of the implementation code is presented. The approaches for the implementation of the analyzer, translator and dynamic analyser are described, as well as the future work.
引用
收藏
页码:849 / 854
页数:6
相关论文
共 50 条
  • [31] Type-Based Automated Verification of Authenticity in Cryptographic Protocols
    Kikuchi, Daisuke
    Kobayashi, Naoki
    PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2009, 5502 : 222 - 236
  • [32] ASPIER: An Automated Framework for Verifying Security Protocol Implementations
    Chaki, Sagar
    Datta, Anupam
    PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, 2009, : 172 - 185
  • [33] Cryptographic protocol verification using tractable classes of horn clauses
    Seidl, Helmut
    Verma, Kumar Neeraj
    PROGRAM ANALYSIS AND COMPILATION, THEORY AND PRACTICE: ESSAYS DEDICATED TO REINHARD WILHELM ON THE OCCASION OF HIS 60TH BIRTHDAY, 2007, 4444 : 97 - +
  • [34] Security and cryptographic hardware implementations
    Sklavos, N
    Proceedings of the 46th IEEE International Midwest Symposium on Circuits & Systems, Vols 1-3, 2003, : 768 - 769
  • [35] Integrating Automated and Interactive Protocol Verification
    Brucker, Achim D.
    Moedersheim, Sebastian A.
    FORMAL ASPECTS IN SECURITY AND TRUST, 2010, 5983 : 248 - +
  • [36] Verified Cryptographic Implementations for TLS
    Bhargavan, Karthikeyan
    Fournet, Cedric
    Corin, Ricardo
    Zalinescu, Eugen
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2012, 15 (01)
  • [37] Type-Based Automated Verification of Authenticity in Asymmetric Cryptographic Protocols
    Dahl, Morten
    Kobayashi, Naoki
    Sun, Yunde
    Huttel, Hans
    AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS, 2011, 6996 : 75 - +
  • [38] Semi-automated verification of security proofs of quantum cryptographic protocols
    Kubota, Takahiro
    Kakutani, Yoshihiko
    Kato, Go
    Kawano, Yasuhito
    Sakurada, Hideki
    JOURNAL OF SYMBOLIC COMPUTATION, 2016, 73 : 192 - 220
  • [39] Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach
    Kobeissi, Nadim
    Bhargavan, Karthikeyan
    Blanchet, Bruno
    Proceedings - 2nd IEEE European Symposium on Security and Privacy, EuroS and P 2017, 2017, : 435 - 450
  • [40] Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic and Computational Approach
    Kobeissi, Nadim
    Bhargavan, Karthikeyan
    Blanchet, Bruno
    2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2017, : 435 - 450