Bitte benutzen Sie diese Kennung, um auf die Ressource zu verweisen: http://dx.doi.org/10.18419/opus-13472
Langanzeige der Metadaten
DC ElementWertSprache
dc.contributor.authorBhargavan, Karthikeyan-
dc.contributor.authorBichhawat, Abhishek-
dc.contributor.authorHosseyni, Pedram-
dc.contributor.authorKüsters, Ralf-
dc.contributor.authorPruiksma, Klaas-
dc.contributor.authorSchmitz, Guido-
dc.contributor.authorWaldmann, Clara-
dc.contributor.authorWürtele, Tim-
dc.date.accessioned2023-09-08T12:49:26Z-
dc.date.available2023-09-08T12:49:26Z-
dc.date.issued2023de
dc.identifier.urihttp://nbn-resolving.de/urn:nbn:de:bsz:93-opus-ds-134914de
dc.identifier.urihttp://elib.uni-stuttgart.de/handle/11682/13491-
dc.identifier.urihttp://dx.doi.org/10.18419/opus-13472-
dc.description.abstractWhile cryptographic protocols are often analyzed in isolation, they are typically deployed within a stack of protocols, where each layer relies on the security guarantees provided by the protocol layer below it, and in turn provides its own security functionality to the layer above. Formally analyzing the whole stack in one go is infeasible even for semi-automated verification tools, and impossible for pen-and-paper proofs. The DY* protocol verification framework offers a modular and scalable technique that can reason about large protocols, specified as a set of F* modules. However, it does not support the compositional verification of layered protocols since it treats the global security invariants monolithically. In this paper, we extend DY* with a new methodology that allows analysts to modularly analyze each layer in a way that compose to provide security for a protocol stack. Importantly, our technique allows a layer to be replaced by another implementation, without affecting the proofs of other layers. We demonstrate this methodology on two case studies. We also present a verified library of generic authenticated and confidential communication patterns that can be used in future protocol analyses and is of independent interest.en
dc.language.isoende
dc.rightsinfo:eu-repo/semantics/openAccessde
dc.subject.ddc004de
dc.titleLayered symbolic security analysis in DY*en
dc.typeconferenceObjectde
ubs.bemerkung.externTechnical report corresponding to a paper published at ESORICS 2023de
ubs.fakultaetInformatik, Elektrotechnik und Informationstechnikde
ubs.fakultaetFakultätsübergreifend / Sonstige Einrichtungde
ubs.institutInstitut für Informationssicherheitde
ubs.institutFakultätsübergreifend / Sonstige Einrichtungde
ubs.konferenznameEuropean Symposium on Research in Computer Security (28th, 2023, Den Haag)de
ubs.publikation.noppnyesde
ubs.publikation.typKonferenzbeitragde
Enthalten in den Sammlungen:05 Fakultät Informatik, Elektrotechnik und Informationstechnik

Dateien zu dieser Ressource:
Datei Beschreibung GrößeFormat 
Layered_Symbolic_Security_Analysis_in_DYstar_TR.pdf465 kBAdobe PDFÖffnen/Anzeigen


Alle Ressourcen in diesem Repositorium sind urheberrechtlich geschützt.