Automated Verification Of Cryptographic Protocol Implementations

被引:0
|
作者
Babenko, Liudmila [1 ]
Pisarev, Ilya [1 ]
机构
[1] Southern Fed Univ, Informat Technol Secur Dept, Taganrog, Russia
关键词
verification; parser; translator; dynamic analysis; formal verification; cryptographic protocols; model;
D O I
10.1109/DeSE.2019.00157
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
When implementing systems using a secure data connection between components, it is important to analyze the security of data transmission. Secure data transfer is achieved by using cryptographic protocols. It is important to verify the security of cryptographic protocols already implemented in the system, since this is the last iteration of their compilation in the form of their implementation in the selected progranuning language. The paper proposes a scheme and approaches for creating an automated security verifier of cryptographic protocol implementations. The problems that arise when implementing cryptographic protocols in progranuning languages are described. A verification scheme based on the use of a source code analyzer for extracting the structure of cryptographic protocols, translating their structure of the Alice-Bob format protocol into the specification language for formal verifiers, and dynamic analysis of the implementation code is presented. The approaches for the implementation of the analyzer, translator and dynamic analyser are described, as well as the future work.
引用
收藏
页码:849 / 854
页数:6
相关论文
共 50 条
  • [41] DY☆: A Modular Symbolic Verification Framework for Executable Cryptographic Protocol Code
    Bhargavan, Karthikeyan
    Bichhawat, Abhishek
    Quoc Huy Do
    Hosseyni, Pedram
    Kuesters, Ralf
    Schmitz, Guido
    Wuertele, Tim
    2021 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2021), 2021, : 523 - 542
  • [42] Cryptographic and non-cryptographic network applications and their optical implementations
    Arrazola, Juan Miguel
    Marwah, Ashutosh
    Lovitz, Benjamin
    Touchette, Dave
    Lutkenhaus, Norbert
    2018 IEEE PHOTONICS SOCIETY SUMMER TOPICAL MEETING SERIES (SUM), 2018, : 9 - 10
  • [43] Slede: Framework for Automatic Verification of Sensor Network Security Protocol Implementations
    Hanna, Youssef
    Rajan, Hridesh
    2009 31ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, COMPANION VOLUME, 2009, : 427 - 428
  • [44] Formal Verification of Resource Synchronization Protocol Implementations: A Case Study in RTEMS
    Shi, Junjie
    von Egidy, Christoph-Cordt
    Chen, Kuan-Hsun
    Chen, Jian-Jia
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 41 (11) : 4157 - 4168
  • [45] Comparative Analysis of Flexible Cryptographic Implementations
    Rashid, Muhammad
    Imran, Malik
    Jafri, Atif Raza
    2016 11TH INTERNATIONAL SYMPOSIUM ON RECONFIGURABLE COMMUNICATION-CENTRIC SYSTEMS-ON-CHIP (RECOSOC), 2016,
  • [46] Protected memristive implementations of cryptographic functions
    Chen, Ziang
    Chen, Li-Wei
    Zhao, Xianyue
    Li, Kefeng
    Schmidt, Heidemarie
    Polian, Ilia
    Du, Nan
    PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2025, 383 (2288):
  • [47] Program Analysis of Cryptographic Implementations for Security
    Rahaman, Sazzadur
    Yao, Danfeng
    2017 IEEE CYBERSECURITY DEVELOPMENT (SECDEV), 2017, : 61 - 68
  • [48] Mechanized verification of cryptographic security of cryptographic security protocol implementation in JAVA through model extraction in the computational model
    Li, Zimao
    Meng, Bo
    Wang, Dejun
    Chen, Wei
    Journal of Software Engineering, 2015, 9 (01): : 1 - 32
  • [49] Synthesis of Fault Attacks on Cryptographic Implementations
    Barthe, Gilles
    Dupressoir, Francois
    Fouque, Pierre-Alain
    Gregoire, Benjamin
    Zapalowicz, Jean-Christophe
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1016 - 1027
  • [50] Localized Electromagnetic Analysis of Cryptographic Implementations
    Heyszl, Johann
    Mangard, Stefan
    Heinz, Benedikt
    Stumpf, Frederic
    Sigl, Georg
    TOPICS IN CRYPTOLOGY - CT-RSA 2012, 2012, 7178 : 231 - +