Guiding a general-purpose C verifier to prove cryptographic protocols

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Proving cryptographic C programs secure with general-purpose verification tools

Security protocols, such as TLS or Kerberos, and security devices such as the Trusted Platform Module (TPM), Hardware Security Modules (HSMs) or PKCS#11 tokens, are central to many computer interactions. Yet, such security critical components are still often found vulnerable to attack after their deployment, either because the specification is insecure, or because of implementation errors. Tech...

متن کامل

Introduction to Cryptographic Protocols

1 : x||y String x is concatenated with string y. 2 : λ(C) Distribution of a given instance or random variable C. 3 : D(X, Y) Statistical distance between the distributions of the two random variables X and Y. 6 : = Stat Statistical indistinguishability between two Random Variables: see Definition 8. 7 : = Comp Computational indistinguishability between two Random Variables: see Definition 9. 8 ...

متن کامل

Guiding Planner Backjumping Using Verifier Traces

In this paper, we show how a planner can use a modelchecking verifier to guide state space search. In our work on hard real-time, closed-loop planning, we use a model-checker’s reachability computations to determine whether plans will be successfully executed. For planning to proceed efficiently, we must be able to efficiently repair candidate plans that are not correct. Reachability verifiers ...

متن کامل

A Rational Approach to Cryptographic Protocols

This work initiates an analysis of several cryptographic protocols from a rational point of view using a game-theoretical approach, which allows us to represent not only the protocols but also possible misbehaviours of parties. Concretely, several concepts of two-person games and of twoparty cryptographic protocols are here combined in order to model the latters as the formers. One of the main ...

متن کامل

Cryptographic Protocols to Prevent Spam

Email's main (and initial) use is professional and personal communication. Email is very efficient, convenient and low-cost, especially when automatically sent by programs to many recipients ('bulk email'). Therefore, email is also used to distribute other messages: from unsolicited offerings and ads, to malicious content such as viruses and scams. Users are rarely interested in these messages;...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Computer Security

سال: 2014

ISSN: 1875-8924,0926-227X

DOI: 10.3233/jcs-140508