Abstract. ProVerif over-approximates the attacker’s power to enable verification of processes under replication. Unfortunately, this results in ProVerif finding false attacks. This problem is particularly common in protocols whereby a participant commits to a particular value and later reveals their value. We introduce a method to reduce false attacks when analysing secrecy. First, we show how inserting phases into non-replicated processes enables a more accurate translation to Horn clauses which avoids some false attacks. Secondly, we generalise our methodology to processes under replication. Finally, we demonstrate the applicability of our technique by analysing BlueTooth Simple Pairing. Moreover, we propose a simplification of this proto...
International audienceThis paper presents an extension of the automatic protocol verifier ProVerif i...
In today’s computer-dominated world, cryptographic security protocols are exceptionally important in...
We present a new automatic technique for proving strong secrecy for security protocols. Strong secre...
ProVerif over-approximates the attacker’s power to enable verification of processes under replicatio...
ProVerif is a widely used security protocol verifier. Internally, ProVerif uses an abstract represen...
International audienceThis chapter presents a method for verifying security protocols based on an ab...
International audienceThis chapter presents a method for verifying security protocols based on an ab...
We study an automatic technique for the verification of cryptographic protocols based on a Horn clau...
We study an automatic technique for the verification of cryptographic protocols based on a Horn clau...
Abstract. This chapter presents a method for verifying security protocols based on an abstract repre...
ProVerif is a popular tool for the fully automatic analysis of security protocols, offering very goo...
International audienceAfter giving general context on the verification of security protocols, we foc...
International audienceAfter giving general context on the verification of security protocols, we foc...
We propose a new security measure for commitment protocols, called Universally Composable (UC) Commi...
In Proceedings HCVS/VPT 2022, arXiv:2211.10675International audienceProVerif is a widely used securi...
International audienceThis paper presents an extension of the automatic protocol verifier ProVerif i...
In today’s computer-dominated world, cryptographic security protocols are exceptionally important in...
We present a new automatic technique for proving strong secrecy for security protocols. Strong secre...
ProVerif over-approximates the attacker’s power to enable verification of processes under replicatio...
ProVerif is a widely used security protocol verifier. Internally, ProVerif uses an abstract represen...
International audienceThis chapter presents a method for verifying security protocols based on an ab...
International audienceThis chapter presents a method for verifying security protocols based on an ab...
We study an automatic technique for the verification of cryptographic protocols based on a Horn clau...
We study an automatic technique for the verification of cryptographic protocols based on a Horn clau...
Abstract. This chapter presents a method for verifying security protocols based on an abstract repre...
ProVerif is a popular tool for the fully automatic analysis of security protocols, offering very goo...
International audienceAfter giving general context on the verification of security protocols, we foc...
International audienceAfter giving general context on the verification of security protocols, we foc...
We propose a new security measure for commitment protocols, called Universally Composable (UC) Commi...
In Proceedings HCVS/VPT 2022, arXiv:2211.10675International audienceProVerif is a widely used securi...
International audienceThis paper presents an extension of the automatic protocol verifier ProVerif i...
In today’s computer-dominated world, cryptographic security protocols are exceptionally important in...
We present a new automatic technique for proving strong secrecy for security protocols. Strong secre...