2016
DOI: 10.1007/978-3-319-49109-7_20
|View full text |Cite
|
Sign up to set email alerts
|

Automatic Verification of Security of OpenID Connect Protocol with ProVerif

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…There have been several studies about security verification of standardized cryptographic protocols with formal methods. ProVerif and CryptoVerif [18] have been used to verify other standardized protocols such as ZRTP [19], SN-MPv3 [20], mutual authentication protocol for GSM [21], LTE [22], OpenID Connect protocol [23], and others. Cremers and Horvat [8] verified 30 key exchange protocols standardized in ISO/IEC 11770-2 [9] and ISO/IEC 11770-3 [10] with automated security verification tool Scyther [11], and found some spoofing attacks.…”
Section: Related Workmentioning
confidence: 99%
“…There have been several studies about security verification of standardized cryptographic protocols with formal methods. ProVerif and CryptoVerif [18] have been used to verify other standardized protocols such as ZRTP [19], SN-MPv3 [20], mutual authentication protocol for GSM [21], LTE [22], OpenID Connect protocol [23], and others. Cremers and Horvat [8] verified 30 key exchange protocols standardized in ISO/IEC 11770-2 [9] and ISO/IEC 11770-3 [10] with automated security verification tool Scyther [11], and found some spoofing attacks.…”
Section: Related Workmentioning
confidence: 99%
“…There have been several studies about security verification of standardized cryptographic protocols with formal methods. ProVerif and CryptoVerif [17] have been used to verify other standardized protocols such as ZRTP [18], SNMPv3 [19], mutual authentication protocol for GSM [20], LTE [21], OpenID Connect protocol [22], and others. Cremers and Horvat [7] verified 30 key exchange protocols standardized in ISO/IEC 11770-2 [8] and ISO/IEC 11770-3 [9] with automated security verification tool Scyther [10], and found some spoofing attacks.…”
Section: Related Workmentioning
confidence: 99%