Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3411495.3421365acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
abstract

Verifpal: Cryptographic Protocol Analysis for the Real World

Published: 09 November 2020 Publication History

Abstract

Verifpal is a new automated modeling framework and verifier for cryptographic protocols, optimized with heuristics for common-case protocol specifications, that aims to work better for real-world practitioners, students and engineers without sacrificing comprehensive formal verification features. In order to achieve this, Verifpal introduces a new, intuitive language for modeling protocols that is easier to write and understand than the languages employed by existing tools. Its formal verification paradigm is also designed explicitly to provide protocol modeling that avoids user error.
Verifpal is able to model protocols under an active attacker with unbounded sessions and fresh values, and supports queries for advanced security properties such as forward secrecy or key compromise impersonation. Furthermore, Verifpal's semantics have been formalized within the Coq theorem prover, and Verifpal models can be automatically translated into Coq as well as into ProVerif models for further verification. Verifpal has already been used to verify security properties for Signal, Scuttlebutt, TLS 1.3 as well as the first formal model for the DP-3T pandemic-tracing protocol, which we present in this work. Through Verifpal, we show that advanced verification with formalized semantics and sound logic can exist without any expense towards the convenience of real-world practitioners.

Reference

[1]
Manuel Barbosa, Gilles Barthe, Karthik Bhargavan, Bruno Blanchet, Cas Cremers, Kevin Liao, and Bryan Parno. [n.d.]. SoK: Computer-Aided Cryptography. ([n.,d.]).

Cited By

View all
  • (2024)Lightweight Mutually Authenticated Key Exchange with Physical Unclonable FunctionsCryptography10.3390/cryptography80400468:4(46)Online publication date: 19-Oct-2024
  • (2024)Extremely Simple Fail-Stop ECDSA SignaturesApplied Cryptography and Network Security Workshops10.1007/978-3-031-61489-7_20(230-234)Online publication date: 29-Jun-2024
  • (2023)HAT: Secure and Practical Key Establishment for Implantable Medical DevicesProceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy10.1145/3577923.3583646(213-224)Online publication date: 24-Apr-2023
  • Show More Cited By

Index Terms

  1. Verifpal: Cryptographic Protocol Analysis for the Real World

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CCSW'20: Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop
      November 2020
      176 pages
      ISBN:9781450380843
      DOI:10.1145/3411495
      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 09 November 2020

      Check for updates

      Author Tags

      1. coq theorem prover
      2. cryptographic protocols
      3. formal verification
      4. secure channel protocols
      5. secure implementation

      Qualifiers

      • Abstract

      Funding Sources

      Conference

      CCS '20
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 37 of 108 submissions, 34%

      Upcoming Conference

      CCS '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)7
      • Downloads (Last 6 weeks)2
      Reflects downloads up to 19 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Lightweight Mutually Authenticated Key Exchange with Physical Unclonable FunctionsCryptography10.3390/cryptography80400468:4(46)Online publication date: 19-Oct-2024
      • (2024)Extremely Simple Fail-Stop ECDSA SignaturesApplied Cryptography and Network Security Workshops10.1007/978-3-031-61489-7_20(230-234)Online publication date: 29-Jun-2024
      • (2023)HAT: Secure and Practical Key Establishment for Implantable Medical DevicesProceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy10.1145/3577923.3583646(213-224)Online publication date: 24-Apr-2023
      • (2023)CheckMate: Automated Game-Theoretic Security ReasoningProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623183(1407-1421)Online publication date: 15-Nov-2023
      • (2023)Authenticating Mobile Users to Public Internet Commodity Services Using SIM TechnologyProceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3558482.3590181(151-162)Online publication date: 29-May-2023
      • (2023)Stick: An End-to-End Encryption Protocol Tailored for Social Network PlatformsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.315225620:2(1258-1269)Online publication date: 1-Mar-2023
      • (2023)GASE: A Lightweight Group Authentication Scheme With Key Agreement for Edge Computing ApplicationsIEEE Internet of Things Journal10.1109/JIOT.2022.320433510:1(840-854)Online publication date: 1-Jan-2023
      • (2023)Formal Verification of Authenticated Encryption with Associated Data with Tamarin Prover2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE)10.1109/CSCE60160.2023.00397(2465-2471)Online publication date: 24-Jul-2023
      • (2023)WOTSwana: A Generalized $$\mathcal {S}_{\text{ leeve }}$$ Construction for Multiple Proofs of OwnershipInformation Security and Cryptology – ICISC 202210.1007/978-3-031-29371-9_24(491-511)Online publication date: 31-Mar-2023
      • (2023)Tweakable $$\mathcal {S}_{\text{ leeve }}$$: A Novel $$\mathcal {S}_{\text{ leeve }}$$ Construction Based on Tweakable Hash FunctionsMathematical Research for Blockchain Economy10.1007/978-3-031-18679-0_10(169-186)Online publication date: 19-Feb-2023
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media