DocumentCode :
2510738
Title :
Provable Implementations of Security Protocols
Author :
Gordon, Andrew D.
Author_Institution :
Microsoft Research
fYear :
0
fDate :
0-0 0
Firstpage :
345
Lastpage :
346
Abstract :
The author implements the relatively new enterprise of adapting formal methods for security to work on code instead of abstract models. The goal is to lower the practical cost of security protocol verification by eliminating the need to write a separate formal model. The main technical content is on extracting pi-calculus models from protocol implementation code. Our software is developed in the functional language F#, a dialect of ML
Keywords :
ML language; cryptography; formal verification; pi calculus; protocols; ML language; cryptographic protocol; formal methods; functional language; pi-calculus; security protocol verification; Algorithm design and analysis; Automation; Computational modeling; Computer languages; Computer security; Cryptographic protocols; Cryptography; Design methodology; Information security; Robustness;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Logic in Computer Science, 2006 21st Annual IEEE Symposium on
Conference_Location :
Seattle, WA
ISSN :
1043-6871
Print_ISBN :
0-7695-2631-4
Type :
conf
DOI :
10.1109/LICS.2006.43
Filename :
1691245
Link To Document :
بازگشت