Using transition systems to model and verify the implementation of security protocol
Abstract
References
Index Terms
- Using transition systems to model and verify the implementation of security protocol
Recommendations
A finite transition model for security protocol verification
SIN '13: Proceedings of the 6th International Conference on Security of Information and NetworksThe reachable graphs and FSM methods are successfully used to analyze the network protocols and to generate computable test traces to verify the correctness of protocol communication. But these methods are hard to use to verify the security of the ...
Model based security verification of protocol implementation
Finite transition models such as Automata, Labeled Transition System, have been widely used to model and analyze the complex system and protocol implementations. Those methods model the systems with states and transitions, and present them with a ...
A Generic Methodology for the Modular Verification of Security Protocol Implementations
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecuritySecurity protocols are essential building blocks of modern IT systems. Subtle flaws in their design or implementation may compromise the security of entire systems. It is, thus, important to prove the absence of such flaws through formal verification. ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- General Chairs:
- Atilla Elçi,
- Manoj Singh Gaur,
- Mehmet A. Orgun,
- Oleg B. Makarevich
Sponsors
- Macquarie U., Austarlia
- MNIT: Malaviya National Institute of Technology
- Aksaray Univ.: Aksaray University
- SFedU: Southern Federal University
In-Cooperation
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
- MNIT
- Aksaray Univ.
- SFedU
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 90Total Downloads
- Downloads (Last 12 months)3
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in