A Compiler for the Analysis of Security Protocols. Casper is a program that will take a description of a security protocol in a simple, abstract language, and produce a CSP description of the same protocol, suitable for checking using FDR2. It can be used either to find attacks upon protocols, or to show that no such attack exists, subject to the assumptions of the Dolev-Yao Model (i.e. that the intruder may overhear or intercept messages, decrypt and encrypt messages with keys that he knows, and fake messages, but not perform any cryptological attacks).

References in zbMATH (referenced in 95 articles )

Showing results 1 to 20 of 95.
Sorted by year (citations)

1 2 3 4 5 next

  1. Basin, David; Cremers, Cas; Meadows, Catherine: Model checking security protocols (2018)
  2. Cleaveland, Rance; Roscoe, A. W.; Smolka, Scott A.: Process algebra and model checking (2018)
  3. Mansor, Hafizah; Markantonakis, Konstantinos; Akram, Raja Naeem; Mayes, Keith; Gurulian, Iakovos: Log your car: reliable maintenance services record (2017)
  4. Almousa, Omar; Mödersheim, Sebastian; Viganò, Luca: Alice and Bob: reconciling formal models and implementation (2015)
  5. Basin, David; Keller, Michel; Radomirović, Saša; Sasse, Ralf: Alice and Bob meet equational theories (2015)
  6. Basin, David; Cremers, Cas; Meier, Simon: Provably repairing the ISO/IEC 9798 standard for entity authentication (2012)
  7. Castagna, Giuseppe; Dezani-Ciancaglini, Mariangiola; Padovani, Luca: On global types and multi-party sessions (2012)
  8. Cremers, Cas; Mauw, Sjouke: Operational semantics and verification of security protocols. (2012)
  9. Halpern, Joseph Y.; Pucella, Riccardo: Modeling adversaries in a logic for security protocol analysis (2012)
  10. Luu, Anh Tuan; Sun, Jun; Liu, Yang; Dong, Jin Song: SeVe: automatic tool for verification of security protocols (2012)
  11. Palikareva, Hristina; Ouaknine, Joël; Roscoe, A. W.: SAT-solving in CSP trace refinement (2012)
  12. Zhang, Zijian; Zhu, Liehuang; Liao, Lejian; Wang, Mingzhong: Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings (2012)
  13. Akram, Raja Naeem; Markantonakis, Konstantinos; Mayes, Keith: Application-binding protocol in the user centric smart card ownership model (2011)
  14. Basin, David; Caleiro, Carlos; Ramos, Jaime; Viganò, Luca: Distributed temporal logic for the analysis of security protocol models (2011)
  15. Aldini, Alessandro; Bernardo, Marco; Corradini, Flavio: A process algebraic approach to software architecture design (2010)
  16. Chevalier, Yannick; Rusinowitch, Michaël: Compiling and securing cryptographic protocols (2010)
  17. Hasuo, Ichiro; Kawabe, Yoshinobu; Sakurada, Hideki: Probabilistic anonymity via coalgebraic simulations (2010)
  18. Patel, Reema; Borisaniya, Bhavesh; Patel, Avi; Patel, Dhiren; Rajarajan, Muttukrishnan; Zisman, A.: Comparative analysis of formal model checking tools for security protocol verification (2010)
  19. Beauxis, Romain; Palamidessi, Catuscia: Probabilistic and nondeterministic aspects of anonymity (2009)
  20. Boureanu, Ioana; Cohen, Mika; Lomuscio, Alessio: Automatic verification of temporal-epistemic properties of cryptographic protocols (2009)

1 2 3 4 5 next