Formal Models and Techniques for Analyzing Security Protocols: A Tutorial

Formal Models and Techniques for Analyzing Security Protocols: A Tutorial. Véronique Cortier and Steve Kremer. Foundations and Trends in Programming Languages, 1(3):151–267, 2014.

Download

[PDF] [HTML] 

Abstract

Security protocols are distributed programs that aim at securing communications by the means of cryptography. They are for instance used to secure electronic payments, home banking and more recently electronic elections. Given The financial and societal impact in case of failure, and the long history of design flaws in such protocol, formal verification is a necessity. A major difference from other safety critical systems is that the properties of security protocols must hold in the presence of an arbitrary adversary. The aim of this paper is to provide a tutorial to some modern approaches for formally modeling protocols, their goals and automatically verifying them.

BibTeX

@Article{CK-fntpl-14,
  abstract =     {Security protocols are distributed programs that aim
                  at securing communications by the means of
                  cryptography. They are for instance used to secure
                  electronic payments, home banking and more recently
                  electronic elections. Given The financial and
                  societal impact in case of failure, and the long
                  history of design flaws in such protocol, formal
                  verification is a necessity. A major difference from
                  other safety critical systems is that the properties
                  of security protocols must hold in the presence of
                  an arbitrary adversary. The aim of this paper is to
                  provide a tutorial to some modern approaches for
                  formally modeling protocols, their goals and
                  automatically verifying them.},
  author =      {Cortier, V{\'e}ronique and Kremer, Steve},
  DOI =          {10.1561/2500000001},
  title =      {Formal Models and Techniques for Analyzing Security Protocols: A Tutorial},
  journal =      {Foundations and Trends in Programming Languages},
  year =      {2014},
  volume =      {1},
  number =      {3},
  pages =      {151-267},
}