Security-typed languages for implementation of cryptographic protocols: A case study

被引:0
|
作者
Askarov, A [1 ]
Sabelfeld, A [1 ]
机构
[1] Chalmers, Dept Comp Sci, S-41296 Gothenburg, Sweden
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security protocols are critical for protecting modem communication infrastructures and are therefore subject to thorough analysis. However practical implementations of these protocols lack the same level of attention and thus may be more exposed to attacks. This paper discusses security assurance provided by security-typed languages when implementing cryptographic protocols. Our results are, based on a case study using Jif, a Java-based security-typed language, for implementing a non-trivial cryptographic protocol that allows playing online poker without a trusted third party. The case study deploys the largest program written in a security-typed language to date and identifies insights ranging from security guarantees to useful patterns of secure programming.
引用
收藏
页码:197 / 221
页数:25
相关论文
共 50 条
  • [21] A SYSTEM FOR DECIDING THE SECURITY OF CRYPTOGRAPHIC PROTOCOLS
    WATANABE, H
    FUJIWARA, T
    KASAMI, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1993, E76A (01) : 96 - 103
  • [22] Hardware Implementation of Ultralightweight Cryptographic Protocols
    Ul Ain, Qurat
    Mujahid, Umar
    Najam-ul-islam, M.
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS), 2015,
  • [23] Resource-aware Authorization Policies for Statically Typed Cryptographic Protocols
    Bugliesi, Michele
    Calzavara, Stefano
    Eigner, Fabienne
    Maffei, Matteo
    2011 IEEE 24TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2011, : 83 - 98
  • [24] Cryptographic Protocols Implementation Security Verification Of The Electronic Voting System Based On Blind Intermediaries
    Babenko, Liudmila
    Pisarev, Ilya
    Popova, Elena
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN'19), 2019,
  • [25] Automatic detection of attacks on cryptographic protocols: A case study
    Cibrario, I
    Durante, L
    Sisto, R
    Valenzano, A
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, PROCEEDINGS, 2005, 3548 : 69 - 84
  • [26] Algebra model and security analysis for cryptographic protocols
    HUAI Jinpeng & LI Xianxian School of Computer
    Science in China(Series F:Information Sciences), 2004, (02) : 199 - 220
  • [27] Algebra model and security analysis for cryptographic protocols
    Huai, JP
    Li, XX
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2004, 47 (02): : 199 - 220
  • [28] Studying Formal Security Proofs for Cryptographic Protocols
    Kogos, Konstantin G.
    Zapechnikov, Sergey, V
    INFORMATION SECURITY EDUCATION FOR A GLOBAL DIGITAL SOCIETY, WISE 10, 2017, 503 : 63 - 73
  • [29] On different approaches to establish the security of cryptographic protocols
    Coffey, T
    Dojen, R
    Flanagan, T
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 637 - 643
  • [30] Security Threats and Cryptographic Protocols for Medical Wearables
    Hernandez-Alvarez, Luis
    Bullon Perez, Juan Jose
    Kristel Batista, Farrah
    Queiruga-Dios, Araceli
    MATHEMATICS, 2022, 10 (06)