2009 22nd IEEE Computer Security Foundations Symposium 2009
DOI: 10.1109/csf.2009.26
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic Protocol Synthesis and Verification for Multiparty Sessions

Abstract: We present a compiler for generating custom cryptographic protocols from high-level multiparty sessions.Sessions specify pre-arranged patterns of message exchanges between distributed participants and their data accesses to a shared store. We define integrity and confidentiality properties of sessions, in a setting where the network and arbitrary compromised parties may be controlled by an adversary. Our compiler enforces these security properties by guarding the sending and receiving of session messages by ef… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
90
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 73 publications
(90 citation statements)
references
References 18 publications
0
90
0
Order By: Relevance
“…This process is insecure because, depending on the high value received for x on channel s [2], that is, on whether the Q-set is H 1 or H 2 , the low value true ⊥ will be emitted or not on channel s [3], leading to…”
Section: Examples Of Information Flow Security In Sessionsmentioning
confidence: 99%
“…This process is insecure because, depending on the high value received for x on channel s [2], that is, on whether the Q-set is H 1 or H 2 , the low value true ⊥ will be emitted or not on channel s [3], leading to…”
Section: Examples Of Information Flow Security In Sessionsmentioning
confidence: 99%
“…Some start with a crypto-free protocol, and transform it into a protocol meeting security goals [9,4]. Others transform a protocol secure in a weak adversary model into protocols satisfying those goals with multi-session, active adversary [20].…”
Section: Preserving Security Goal Formulasmentioning
confidence: 99%
“…Our theory, based on multiparty sessions, can verify processes against a contract globally agreed by multiple distributed peers. [2] uses refinement types for channels to verify authentication in multiparty session protocols, but does not consider multi-session properties. The work [7] investigates a relationship between a dual intuitionistic linear logic and binary session types, and shows that the former defines a proof system for a session calculus which can automatically characterise and guarantee a session fidelity and global progress.…”
Section: Related Work and Further Topicsmentioning
confidence: 99%
“…Types offer a stable linkage between the fundamental dynamics of programs and their mathematical abstractions, serving as a highly effective basis for safety assurance. In the context of process algebras, approaches like [5,13,18] allow tractable 2 (e.g., with respect to model checking techniques) validation of properties such as session fidelity, progress, and error freedom. Furthermore, they enable the specification of global properties of multiparty interactions, yet enabling modular local verification of each principal.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation