Automated Verification Of Cryptographic Protocol Implementations

被引:0
作者
Babenko, Liudmila [1 ]
Pisarev, Ilya [1 ]
机构
[1] Southern Fed Univ, Informat Technol Secur Dept, Taganrog, Russia
来源
12TH INTERNATIONAL CONFERENCE ON THE DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE 2019) | 2019年
关键词
verification; parser; translator; dynamic analysis; formal verification; cryptographic protocols; model;
D O I
10.1109/DeSE.2019.00157
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
When implementing systems using a secure data connection between components, it is important to analyze the security of data transmission. Secure data transfer is achieved by using cryptographic protocols. It is important to verify the security of cryptographic protocols already implemented in the system, since this is the last iteration of their compilation in the form of their implementation in the selected progranuning language. The paper proposes a scheme and approaches for creating an automated security verifier of cryptographic protocol implementations. The problems that arise when implementing cryptographic protocols in progranuning languages are described. A verification scheme based on the use of a source code analyzer for extracting the structure of cryptographic protocols, translating their structure of the Alice-Bob format protocol into the specification language for formal verifiers, and dynamic analysis of the implementation code is presented. The approaches for the implementation of the analyzer, translator and dynamic analyser are described, as well as the future work.
引用
收藏
页码:849 / 854
页数:6
相关论文
共 18 条
  • [1] Babenko L.K., 2018, CYBERSECURITY ISSUES, P28
  • [2] Computationally Sound Verification of Source Code
    Backes, Michael
    Maffei, Matteo
    Unruh, Dominique
    [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 387 - 398
  • [3] Bhargavan K, 2008, ACM T PROGRAMMING LA, V31, P5
  • [4] Bhargavan K., 2006, INT WORKSH WEB SERV, P88
  • [5] Bhargavan K, 2008, P 2008 ACM S INF COM, P123
  • [6] Bhargavan K, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P459
  • [7] Towards an Empirical Analysis of .NET Framework and C# language Features' Adoption
    Capek, Petr
    Kral, Erik
    Senkerik, Roman
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), 2015, : 865 - 866
  • [8] ASPIER: An Automated Framework for Verifying Security Protocol Implementations
    Chaki, Sagar
    Datta, Anupam
    [J]. PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, 2009, : 172 - 185
  • [9] Cremers C. J. F, 2008, INT C COMP AID VER, P414
  • [10] Goubault-Larrecq J., 2005, INT WORKSH VER MOD C, P363