2022
DOI: 10.1007/978-3-031-06788-4_42
|View full text |Cite
|
Sign up to set email alerts
|

Formal Verification of Security Protocols: ProVerif and Extensions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 26 publications
0
2
0
Order By: Relevance
“…To verify the security of the protocol, we can also use formal proofs, e.g., BAN logic [21], Real-Or-Random (ROR) [22], Random Oracle Model (ROM) [23], or Syverson-Van Oorschot (SVO) [24]. However, these proofs are very complex, so for verifying protocols, we mostly used the tools that automatically implement the described methods for verifying protocols (Scyther [25,26], Tamarin [27,28], ProVerif [29][30][31], AVISPA [32], or the tool mentioned in [5]).…”
Section: Related Workmentioning
confidence: 99%
“…To verify the security of the protocol, we can also use formal proofs, e.g., BAN logic [21], Real-Or-Random (ROR) [22], Random Oracle Model (ROM) [23], or Syverson-Van Oorschot (SVO) [24]. However, these proofs are very complex, so for verifying protocols, we mostly used the tools that automatically implement the described methods for verifying protocols (Scyther [25,26], Tamarin [27,28], ProVerif [29][30][31], AVISPA [32], or the tool mentioned in [5]).…”
Section: Related Workmentioning
confidence: 99%
“…When verifying security protocols, we can use methods such as time automatics [28,29], BAN logic [30], GNY logic [31], real-or-random (ROR) [32], random Oracle model (ROM) [33], or Syverson-Van Oorschot (SVO) logic [34]. In addition, protocol verification is possible with such tools as Scyther [35,36], Tamarin [37,38], ProVerif [39][40][41], Avispa [42], or the tools mentioned in [22,43], or [44].…”
Section: Introductionmentioning
confidence: 99%