International audienceMany cryptographic security definitions can be naturally formulated as observational equivalence properties. However, existing automated tools for verifying the observational equivalence of cryptographic protocols are limited: they do not handle protocols with mutable state and an unbounded number of sessions. We propose a novel definition of observational equivalence for multiset rewriting systems. We then extend the Tamarin prover, based on multiset rewriting, to prove the observational equivalence of protocols with mutable state, an unbounded number of sessions, and equational theories such as Diffie-Hellman exponentiation. We demonstrate its effectiveness on case studies, including a stateful TPM protocol
. We use properties of observational equivalence for a probabilistic process calculus to prove an au...
We advance the state-of-the-art in automated symbolic cryptographic protocol analysis by providing t...
International audienceRecently, many tools have been proposed for automatically analysing, in symbol...
International audienceExclusive-or (XOR) operations are common in cryptographic protocols, in partic...
Security APIs, key servers and protocols that need to keep the status of transactions, require to ...
The Tamarin prover supports the automated, unbounded, symbolic analysis of security protocols. It fe...
During the last three decades, there has been considerable research devoted to the symbolic analysis...
Abstract. The Tamarin prover supports the automated, unbounded, symbolic analysis of security protoc...
International audienceFormal methods have proved their usefulness for analyzing the security of prot...
International audienceFormal methods have proved their usefulness for analyzing the security of prot...
Abstract. Indistinguishability properties are essential in formal verifi-cation of cryptographic pro...
International audienceThis paper presents an extension of the automatic protocol verifier ProVerif i...
International audienceSymbolic models for security protocol verification, following the sem-inal ide...
International audienceTamarin is a popular tool dedicated to the formal analysis of security protoco...
A security protocol is an exchange of messages between multiple parties with the intent of achieving...
. We use properties of observational equivalence for a probabilistic process calculus to prove an au...
We advance the state-of-the-art in automated symbolic cryptographic protocol analysis by providing t...
International audienceRecently, many tools have been proposed for automatically analysing, in symbol...
International audienceExclusive-or (XOR) operations are common in cryptographic protocols, in partic...
Security APIs, key servers and protocols that need to keep the status of transactions, require to ...
The Tamarin prover supports the automated, unbounded, symbolic analysis of security protocols. It fe...
During the last three decades, there has been considerable research devoted to the symbolic analysis...
Abstract. The Tamarin prover supports the automated, unbounded, symbolic analysis of security protoc...
International audienceFormal methods have proved their usefulness for analyzing the security of prot...
International audienceFormal methods have proved their usefulness for analyzing the security of prot...
Abstract. Indistinguishability properties are essential in formal verifi-cation of cryptographic pro...
International audienceThis paper presents an extension of the automatic protocol verifier ProVerif i...
International audienceSymbolic models for security protocol verification, following the sem-inal ide...
International audienceTamarin is a popular tool dedicated to the formal analysis of security protoco...
A security protocol is an exchange of messages between multiple parties with the intent of achieving...
. We use properties of observational equivalence for a probabilistic process calculus to prove an au...
We advance the state-of-the-art in automated symbolic cryptographic protocol analysis by providing t...
International audienceRecently, many tools have been proposed for automatically analysing, in symbol...