Verified interoperable implementations of security protocols

53Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.

Abstract

We present an architecture and tools for verifying implementations of security protocols. Our implementations can run with both concrete and symbolic implementations of cryptographic algorithms. The concrete implementation is for production and interoperability testing. The symbolic implementation is for debugging and formal verification. We develop our approach for protocols written in F, a dialect of ML, and verify them by compilation to ProVerif, a resolution-based theorem prover for cryptographic protocols. We establish the correctness of this compilation scheme, and we illustrate our approach with protocols for Web Services security. © 2008 ACM.

Cite

CITATION STYLE

APA

Bhargavan, K., Fournet, C., Gordon, A. D., & Tse, S. (2008). Verified interoperable implementations of security protocols. ACM Transactions on Programming Languages and Systems, 31(1). https://doi.org/10.1145/1452044.1452049

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free