Formal verification of security protocol implementations: a survey

被引:47
作者
Avalle, Matteo [1 ]
Pironti, Alfredo [2 ]
Sisto, Riccardo [1 ]
机构
[1] Politecn Torino, Dipartimento Automat & Informat, I-10129 Turin, Italy
[2] INRIA Paris Rocquencourt, Prosecco, F-75013 Paris, France
关键词
Security protocols; Automated formal verification; Software verification; Sound refinement; AUTHENTICATION; REFINEMENT;
D O I
10.1007/s00165-012-0269-9
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Automated formal verification of security protocols has been mostly focused on analyzing high-level abstract models which, however, are significantly different from real protocol implementations written in programming languages. Recently, some researchers have started investigating techniques that bring automated formal proofs closer to real implementations. This paper surveys these attempts, focusing on approaches that target the application code that implements protocol logic, rather than the libraries that implement cryptography. According to these approaches, libraries are assumed to correctly implement some models. The aim is to derive formal proofs that, under this assumption, give assurance about the application code that implements the protocol logic. The two main approaches of model extraction and code generation are presented, along with the main techniques adopted for each approach.
引用
收藏
页码:99 / 123
页数:25
相关论文
共 88 条
[1]   Reconciling two views of cryptography (The computational soundness of formal encryption) [J].
Abadi, M ;
Rogaway, P .
JOURNAL OF CRYPTOLOGY, 2002, 15 (02) :103-127
[2]   Prudent engineering practice for cryptographic protocols [J].
Abadi, M ;
Needham, R .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1996, 22 (01) :6-15
[3]   Mobile values, new names, and secure communication [J].
Abadi, M ;
Fournet, C .
ACM SIGPLAN NOTICES, 2001, 36 (03) :104-115
[4]  
Abadi M, 1998, 149 DIG SYST RES CTR
[5]   On Protection by Layout Randomization [J].
Abadi, Martin ;
Plotkin, Gordon D. .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2012, 15 (02)
[6]  
Aizatulin M, 2012, 19 ACM C CO IN PRESS
[7]  
Aizatulin M, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P331
[8]   Plaintext Recovery Attacks Against SSH [J].
Albrecht, Martin R. ;
Paterson, Kenneth G. ;
Watson, Gaven J. .
PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2009, :16-26
[9]  
AlFardan N., 2012, NETW DISTR SYST SEC
[10]  
Almeida JB, 2010, LECT NOTES COMPUT SC, V6345, P151, DOI 10.1007/978-3-642-15497-3_10