Cryptographic protocols aim at securing communications over insecure networks like the Internet. Over the past decades, numerous decision procedures and tools have been developed to automatically analyse the security of protocols. The field has now reached a good level of maturity with efficient techniques for the automatic security analysis of protocols After an overview of some famous protocols and flaws, we will describe the current techniques for security protocols analysis, often based on logic, and review the key challenges towards a fully automated verification.
@InProceedings{cortier:LIPIcs.CSL.2020.1, author = {Cortier, V\'{e}ronique}, title = {{Verification of Security Protocols}}, booktitle = {28th EACSL Annual Conference on Computer Science Logic (CSL 2020)}, pages = {1:1--1:2}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-132-0}, ISSN = {1868-8969}, year = {2020}, volume = {152}, editor = {Fern\'{a}ndez, Maribel and Muscholl, Anca}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.CSL.2020.1}, URN = {urn:nbn:de:0030-drops-116447}, doi = {10.4230/LIPIcs.CSL.2020.1}, annote = {Keywords: Security protocols, automated deduction, security} }
Feedback for Dagstuhl Publishing