Recently, we presented an automatic technique for proving secrecy and authentication properties for security protocols that manipulate lists of unbounded length, for an unbounded number of sessions. That work relies on an extension of Horn clauses, generalized Horn clauses, designed to support unbounded lists, and on a resolution algorithm on these clauses. However, in that previous work, we had to model protocols manually with generalized Horn clauses, which is unpractical.In this work, we present an extension of the input language of ProVerif, a variant of the applied pi calculus, to model protocols with lists of unbounded length. We give its formal meaning, translate it automatically to generalized Horn clauses, and prove that this trans...
ProVerif is a widely used security protocol verifier. Internally, ProVerif uses an abstract represen...
This thesis is developed in the framework of the symbolic analysis of security protocols. The contri...
This thesis is developed in the framework of the symbolic analysis of security protocols. The contri...
Recently, we presented an automatic technique for proving secrecy and authentication properties for ...
In this thesis, we propose two different techniques for verifying security protocols that manipulate...
In this thesis, we propose two different techniques for verifying security protocols that manipulate...
International audienceWe present a novel automatic technique for proving secrecy and authentication ...
Abstract. We present a novel, simple technique for proving secrecy properties for security protocols...
International audienceThis chapter presents a method for verifying security protocols based on an ab...
International audienceThis chapter presents a method for verifying security protocols based on an ab...
International audienceWe present a novel, simple technique for proving secrecy properties for securi...
Abstract. This chapter presents a method for verifying security protocols based on an abstract repre...
International audienceProVerif is an automatic symbolic protocol verifier. It supports a wide range...
In Proceedings HCVS/VPT 2022, arXiv:2211.10675International audienceProVerif is a widely used securi...
International audienceProVerif is an automatic symbolic protocol verifier. It supports a wide range...
ProVerif is a widely used security protocol verifier. Internally, ProVerif uses an abstract represen...
This thesis is developed in the framework of the symbolic analysis of security protocols. The contri...
This thesis is developed in the framework of the symbolic analysis of security protocols. The contri...
Recently, we presented an automatic technique for proving secrecy and authentication properties for ...
In this thesis, we propose two different techniques for verifying security protocols that manipulate...
In this thesis, we propose two different techniques for verifying security protocols that manipulate...
International audienceWe present a novel automatic technique for proving secrecy and authentication ...
Abstract. We present a novel, simple technique for proving secrecy properties for security protocols...
International audienceThis chapter presents a method for verifying security protocols based on an ab...
International audienceThis chapter presents a method for verifying security protocols based on an ab...
International audienceWe present a novel, simple technique for proving secrecy properties for securi...
Abstract. This chapter presents a method for verifying security protocols based on an abstract repre...
International audienceProVerif is an automatic symbolic protocol verifier. It supports a wide range...
In Proceedings HCVS/VPT 2022, arXiv:2211.10675International audienceProVerif is a widely used securi...
International audienceProVerif is an automatic symbolic protocol verifier. It supports a wide range...
ProVerif is a widely used security protocol verifier. Internally, ProVerif uses an abstract represen...
This thesis is developed in the framework of the symbolic analysis of security protocols. The contri...
This thesis is developed in the framework of the symbolic analysis of security protocols. The contri...