In this thesis, we propose two different techniques for verifying security protocols that manipulate lists ofunbounded length.In the first part of the thesis, we present a simple technique for proving secrecy properties for protocols thatmanipulate list elements in a uniform way, for an unbounded number of sessions. More specifically, thistechnique relies on the Horn clause approach used in the automatic verifier ProVerif: we show that if a protocolis proven secure by our technique with lists of length one, then it is secure for lists of unbounded length.Interestingly, this theorem relies on approximations made by our verification technique: in general, secrecy forlists of length one does not imply secrecy for lists of unbounded length.The ...
This thesis is developed in the framework of the symbolic analysis of security protocols. The contri...
International audienceAlthough many works have been dedicated to standard protocols like Needham-Sch...
International audienceAlthough many works have been dedicated to standard protocols like Needham-Sch...
In this thesis, we propose two different techniques for verifying security protocols that manipulate...
International audienceWe present a novel, simple technique for proving secrecy properties for securi...
Abstract. We present a novel, simple technique for proving secrecy properties for security protocols...
International audienceWe present a novel automatic technique for proving secrecy and authentication ...
Recently, we presented an automatic technique for proving secrecy and authentication properties for ...
Recently, we presented an automatic technique for proving secrecy and authentication properties for ...
International audienceThis chapter presents a method for verifying security protocols based on an ab...
International audienceThis chapter presents a method for verifying security protocols based on an ab...
Abstract. This chapter presents a method for verifying security protocols based on an abstract repre...
This thesis is developed in the framework of the symbolic analysis of security protocols. The contri...
This thesis is developed in the framework of the symbolic analysis of security protocols. The contri...
This thesis is developed in the framework of the symbolic analysis of security protocols. The contri...
This thesis is developed in the framework of the symbolic analysis of security protocols. The contri...
International audienceAlthough many works have been dedicated to standard protocols like Needham-Sch...
International audienceAlthough many works have been dedicated to standard protocols like Needham-Sch...
In this thesis, we propose two different techniques for verifying security protocols that manipulate...
International audienceWe present a novel, simple technique for proving secrecy properties for securi...
Abstract. We present a novel, simple technique for proving secrecy properties for security protocols...
International audienceWe present a novel automatic technique for proving secrecy and authentication ...
Recently, we presented an automatic technique for proving secrecy and authentication properties for ...
Recently, we presented an automatic technique for proving secrecy and authentication properties for ...
International audienceThis chapter presents a method for verifying security protocols based on an ab...
International audienceThis chapter presents a method for verifying security protocols based on an ab...
Abstract. This chapter presents a method for verifying security protocols based on an abstract repre...
This thesis is developed in the framework of the symbolic analysis of security protocols. The contri...
This thesis is developed in the framework of the symbolic analysis of security protocols. The contri...
This thesis is developed in the framework of the symbolic analysis of security protocols. The contri...
This thesis is developed in the framework of the symbolic analysis of security protocols. The contri...
International audienceAlthough many works have been dedicated to standard protocols like Needham-Sch...
International audienceAlthough many works have been dedicated to standard protocols like Needham-Sch...