AbstractThis paper presents an approach for the development of model-checkers in a framework, called TOM, merging declarative and imperative features. We illustrate our method by specifying in TOM the Needham-Schroeder public-key protocol that aims to establish a mutual authentication between an initiator and a responder that communicate via an insecure network. We describe the behavior of the agents exchanging messages as well as the intruders and the security invariants the protocol should verify using the rewrite rules of TOM. The (depth-first or breadth-first) exploration of the search space is described using the imperative features of the language. We propose several optimizations and we compare our results to existing approaches
We consider the problem of establishing cryptographic guarantees -- in particular, computational ind...
The area of formal analysis of cryptographic protocols has been an active one since the mid 80’s. T...
On a case study, we present a new approach for verifying cryptographic protocols, based on rewriting...
Colloque avec actes et comité de lecture. internationale.International audienceThis paper presents a...
This paper presents an approach for the development of model-checkers in a framework, called TOM, me...
AbstractThis paper presents a rewriting strategy for the analysis and the verification of communicat...
Ping-pong protocols with recursive definitions of agents, but without any active intruder, are a Tur...
AbstractWe propose a method of formally analysing security protocols based on rewriting. The method ...
AbstractThis paper reports on work in progress on using rewriting techniques for the specification a...
In this paper we show how protocol insecurity problems expressed in a multi-set rewriting formalism ...
Designing and coding security protocols is an error prone task. Several flaws are found in protocol ...
AbstractAn important missing link in the construction of secure systems is finding a practical way t...
In this thesis we propose an abstraction based certification technique for Java programs which is ba...
International audienceIn this paper we present the essential feature we have considered when designi...
Designing distributed protocols is complex and requires actions at very different levels: from the d...
We consider the problem of establishing cryptographic guarantees -- in particular, computational ind...
The area of formal analysis of cryptographic protocols has been an active one since the mid 80’s. T...
On a case study, we present a new approach for verifying cryptographic protocols, based on rewriting...
Colloque avec actes et comité de lecture. internationale.International audienceThis paper presents a...
This paper presents an approach for the development of model-checkers in a framework, called TOM, me...
AbstractThis paper presents a rewriting strategy for the analysis and the verification of communicat...
Ping-pong protocols with recursive definitions of agents, but without any active intruder, are a Tur...
AbstractWe propose a method of formally analysing security protocols based on rewriting. The method ...
AbstractThis paper reports on work in progress on using rewriting techniques for the specification a...
In this paper we show how protocol insecurity problems expressed in a multi-set rewriting formalism ...
Designing and coding security protocols is an error prone task. Several flaws are found in protocol ...
AbstractAn important missing link in the construction of secure systems is finding a practical way t...
In this thesis we propose an abstraction based certification technique for Java programs which is ba...
International audienceIn this paper we present the essential feature we have considered when designi...
Designing distributed protocols is complex and requires actions at very different levels: from the d...
We consider the problem of establishing cryptographic guarantees -- in particular, computational ind...
The area of formal analysis of cryptographic protocols has been an active one since the mid 80’s. T...
On a case study, we present a new approach for verifying cryptographic protocols, based on rewriting...