Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security 2017
DOI: 10.1145/3133956.3134063
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Symbolic Analysis of TLS 1.3

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
82
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 147 publications
(88 citation statements)
references
References 20 publications
0
82
0
Order By: Relevance
“…Tamarin is a state-of-the-art protocol verification tool for the symbolic model, which supports stateful protocols, a high level of automation, and equivalence properties [10], which are necessary to model privacy properties such as unlinkability. It has previously been applied to real-world protocols with complex state machines, numerous messages, and complex security properties such as TLS 1.3 [18]. Moreover, it was recently extended with support for XOR [22], a key ingredient for faithfully analyzing 5G AKA.…”
Section: The Tamarin Provermentioning
confidence: 99%
“…Tamarin is a state-of-the-art protocol verification tool for the symbolic model, which supports stateful protocols, a high level of automation, and equivalence properties [10], which are necessary to model privacy properties such as unlinkability. It has previously been applied to real-world protocols with complex state machines, numerous messages, and complex security properties such as TLS 1.3 [18]. Moreover, it was recently extended with support for XOR [22], a key ingredient for faithfully analyzing 5G AKA.…”
Section: The Tamarin Provermentioning
confidence: 99%
“…Methodology Our work aims to provide rigorous formal analysis and to improve the security of the 5G-AKA standard. Our approach uses formal symbolic modeling with the TAMARIN prover [21], which has been successfully used during the development of major protocols such as TLS 1.3 [16].…”
Section: Introductionmentioning
confidence: 99%
“…The core protocol in TLS 1.2 was also vulnerable to a similar attack, but since the protocol itself is hidden within layers of packet formats and C-like pseudocode, it was difficult for the attack to be detected. However, upon automated symbolic verification [4,5], the attack quickly appeared not just in TLS, but also in variants of SSH and IPsec. Flaws underlying more recent attacks such as Logjam [6] were known for years before they were observed when the vulnerable protocol was analyzed.…”
Section: Introductionmentioning
confidence: 99%