International audienceThis paper presents an experiment in which an implementation of the client side of the SSH Transport Layer Protocol (SSH-TLP) was semi-automatically derived according to a model-driven development paradigm that leverages formal methods in order to obtain high correctness assurance. The approach used in the experiment starts with the formalization of the protocol at an abstract level. This model is then formally proved to fulfill the desired secrecy and authentication properties by using the ProVerif prover. Finally, a sound Java implementation is semi-automatically derived from the verified model using an enhanced version of the Spi2Java framework. The resulting implementation correctly interoperates with third party s...
There has been a significant amount of work devoted to the static verification of security protocol ...
The correct implementation of security protocols is a challenging task. Like any software, to gain h...
Automated formal verification of security protocols has been mostly focused on analyzing high-level ...
Designing and coding security protocols is an error prone task. Several flaws are found in protocol ...
Abstract. We present a case study in the formal verification of an open source Java implementation o...
A novel visual model-driven approach to security protocol design, verification, and implementation i...
International audienceAutomated formal verification of security protocols has been mostly focused on...
Special issue ARES'12International audienceThis paper presents a novel technique for obtaining imple...
This paper presents a novel technique for obtaining implementations of security protocols, proved se...
Abstract—This paper presents a novel framework for prov-ing specifications of security protocols in ...
Spi2Java is a tool that enables semi-automatic generation of cryptographic protocol implementations,...
This paper examines the suitability and use of runtime verification as means for monitoring security...
International audienceWe provide a framework consisting of tools and metatheorems for the end-to-end...
In the past, formal verification of security properties of distributed applications has been mostly ...
AbstractAn important missing link in the construction of secure systems is finding a practical way t...
There has been a significant amount of work devoted to the static verification of security protocol ...
The correct implementation of security protocols is a challenging task. Like any software, to gain h...
Automated formal verification of security protocols has been mostly focused on analyzing high-level ...
Designing and coding security protocols is an error prone task. Several flaws are found in protocol ...
Abstract. We present a case study in the formal verification of an open source Java implementation o...
A novel visual model-driven approach to security protocol design, verification, and implementation i...
International audienceAutomated formal verification of security protocols has been mostly focused on...
Special issue ARES'12International audienceThis paper presents a novel technique for obtaining imple...
This paper presents a novel technique for obtaining implementations of security protocols, proved se...
Abstract—This paper presents a novel framework for prov-ing specifications of security protocols in ...
Spi2Java is a tool that enables semi-automatic generation of cryptographic protocol implementations,...
This paper examines the suitability and use of runtime verification as means for monitoring security...
International audienceWe provide a framework consisting of tools and metatheorems for the end-to-end...
In the past, formal verification of security properties of distributed applications has been mostly ...
AbstractAn important missing link in the construction of secure systems is finding a practical way t...
There has been a significant amount of work devoted to the static verification of security protocol ...
The correct implementation of security protocols is a challenging task. Like any software, to gain h...
Automated formal verification of security protocols has been mostly focused on analyzing high-level ...