Protocol Implementation Generator

The thesis deals with the integration of static verification of security protocols specifications and its safe translation into executable programming languages. The thesis consists of a needed background information, a review of the state of the art in this field, and explanation of a general framework that aims at achieving the mentioned integration and a specific implementation of that framework that achieves it.

[1]  Flemming Nielson,et al.  Static validation of security protocols , 2005, J. Comput. Secur..

[2]  Robin Milner,et al.  A Calculus of Mobile Processes, II , 1992, Inf. Comput..

[3]  Andrew Hutchison,et al.  Automated Attack Analysis and Code Generation in a Multi-Dimensional Security Protocol Engineering Framework , 2003 .

[4]  Dawn Xiaodong Song,et al.  AGVI - Automatic Generation, Verification, and Implementation of Security Protocols , 2001, CAV.

[5]  권태경,et al.  SSL Protocol 기반의 서버인증 , 2003 .

[6]  Hjalte Wedel Vildhøj,et al.  Secure Protocol Implementation with LySa , 2009 .

[7]  Martín Abadi,et al.  A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.

[8]  Andrew D. Gordon,et al.  Verified Interoperable Implementations of Security Protocols , 2006, CSFW.

[9]  Owen Rees,et al.  Efficient and timely mutual authentication , 1987, OPSR.

[10]  Jin-Young Choi,et al.  Automatic generation of the C# code for security protocols verified with Casper/FDR , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[11]  C. A. R. Hoare,et al.  Communicating sequential processes , 1978, CACM.

[12]  Anna Philippou,et al.  Tools and Algorithms for the Construction and Analysis of Systems , 2018, Lecture Notes in Computer Science.

[13]  George C. Necula,et al.  Proof-carrying code , 1997, POPL '97.

[14]  Elton Saul,et al.  SPEAR II The Security Protocol Engineering and Analysis Resource , 1999 .

[15]  Martín Abadi,et al.  A Calculus for Cryptographic Protocols: The spi Calculus , 1999, Inf. Comput..

[16]  Andrew D. Gordon,et al.  Refinement Types for Secure Implementations , 2008, 2008 21st IEEE Computer Security Foundations Symposium.

[17]  Robin Milner,et al.  A Calculus of Mobile Processes, II , 1992, Inf. Comput..

[18]  T. Tanaka,et al.  A Security Protocol Compiler Generating C Source Codes , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[19]  Jonei Cerqueira Barbosa,et al.  What is Mathematical Modelling , 2003 .

[20]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[21]  Eva Rose,et al.  Lightweight Bytecode Verification , 2004, Journal of Automated Reasoning.

[22]  Andreas Podelski,et al.  Tools and algorithms for the construction and analysis of systems , 2006, International Journal on Software Tools for Technology Transfer.

[23]  Mikael Buchholtz,et al.  User ’ s Guide for the LySatool version 2 . 01 , 2005 .

[24]  Alfredo Pironti,et al.  Provably correct Java implementations of Spi Calculus security protocols specifications , 2010, Comput. Secur..

[25]  Thorsten Tarrach SPI2F - A Prototype Code Generator for Security Protocols , 2009 .

[26]  Bruno Blanchet,et al.  An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..

[27]  Andrew William Roscoe,et al.  Model-checking CSP , 1994 .

[28]  Joshua D. Guttman,et al.  Strand spaces: why is a security protocol correct? , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[29]  Gavin Lowe,et al.  Casper: a compiler for the analysis of security protocols , 1997, Proceedings 10th Computer Security Foundations Workshop.

[30]  Rajeev Alur,et al.  A Temporal Logic of Nested Calls and Returns , 2004, TACAS.

[31]  Luca Durante,et al.  Spi2Java: automatic cryptographic protocol Java code generation from spi calculus , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..

[32]  Adriano Valenzano,et al.  Automatic testing equivalence verification of spi calculus specifications , 2003, TSEM.

[33]  Flemming Nielson,et al.  Principles of Program Analysis , 1999, Springer Berlin Heidelberg.

[34]  John Larmouth ASN.1 Complete , 1999 .

[35]  Martín Abadi,et al.  Analyzing security protocols with secrecy types and logic programs , 2002, POPL '02.

[36]  Dawn Xiaodong Song,et al.  Athena: A Novel Approach to Efficient Automatic Security Protocol Analysis , 2001, J. Comput. Secur..

[37]  ROBIN MILNER,et al.  Edinburgh Research Explorer A Calculus of Mobile Processes, I , 2003 .

[38]  Terence Parr The Definitive ANTLR Reference: Building Domain-Specific Languages , 2007 .

[39]  Flemming Nielson,et al.  The Succinct Solver Suite , 2004, TACAS.