ProVerif is an automatic cryptographic protocol verifier, in the formal model (so called Dolev-Yao model). This protocol verifier is based on a representation of the protocol by Horn clauses. Its main features are: It can handle many different cryptographic primitives, including shared- and public-key cryptography (encryption and signatures), hash functions, and Diffie-Hellman key agreements, specified both as rewrite rules or as equations. It can handle an unbounded number of sessions of the protocol (even in parallel) and an unbounded message space. This result has been obtained thanks to some well-chosen approximations. This means that the verifier can give false attacks, but if it claims that the protocol satisfies some property, then the property is actually satisfied. With Andreas Podelski, we have shown that the considered resolution algorithm terminates on a large class of protocols (the so-called ”tagged” protocols, FoSSaCS’03 and TCS). With Xavier Allamigeon, we have implemented attack reconstruction: when the tool cannot prove a property, it tries to reconstruct an attack, that is, an execution trace of the protocol that falsifies the desired property (CSFW’05). This verifier can prove the following properties: secrecy (the adversary cannot obtain the secret, CSFW’01), authentication (SAS’02) and more generally correspondence properties (SAS’03, with Martín Abadi), strong secrecy (the adversary does not see the difference when the value of the secret changes, Oakland’04), equivalences between processes that differ only by terms (LICS’05 with Martín Abadi and Cédric Fournet)

References in zbMATH (referenced in 38 articles )

Showing results 1 to 20 of 38.
Sorted by year (citations)

1 2 next

  1. Chaieb, Marwa; Koscina, Mirko; Yousfi, Souheib; Lafourcade, Pascal; Robbana, Riadh: DABSTERS: a privacy preserving e-voting protocol for permissioned blockchain (2019)
  2. Li, Di Long; Tiu, Alwen: Combining proverif and automated theorem provers for security protocol verification (2019)
  3. Abadi, Martín; Blanchet, Bruno; Fournet, Cédric: The applied pi calculus, mobile values, new names, and secure communication (2018)
  4. Basin, David; Cremers, Cas; Meadows, Catherine: Model checking security protocols (2018)
  5. Bugliesi, Michele; Calzavara, Stefano; Focardi, Riccardo: Formal methods for web security (2017)
  6. Kassem, Ali; Falcone, Yliès; Lafourcade, Pascal: Formal analysis and offline monitoring of electronic exams (2017)
  7. Almousa, Omar; Mödersheim, Sebastian; Viganò, Luca: Alice and Bob: reconciling formal models and implementation (2015)
  8. Basin, David; Keller, Michel; Radomirović, Saša; Sasse, Ralf: Alice and Bob meet equational theories (2015)
  9. Chen, Chen; Jia, Limin; Xu, Hao; Luo, Cheng; Zhou, Wenchao; Loo, Boon Thau: A program logic for verifying secure routing protocols (2015)
  10. Chothia, Tom; Smyth, Ben; Staite, Chris: Automatically checking commitment protocols in proverif without false attacks (2015) ioport
  11. Fan, Peiru; Zhao, Bo; Shi, Yuan; Chen, Zhihong; Ni, Mingtao: An improved vTPM-VM live migration protocol (2015) ioport
  12. Li, Yongjian; Pang, Jun: Formalizing provable anonymity in Isabelle/HOL (2015)
  13. Sattarzadeh, Behnam; Fallah, Mehran S.: Automated type-based analysis of injective agreement in the presence of compromised principals (2015)
  14. Bella, Giampaolo: Inductive study of confidentiality: for everyone (2014) ioport
  15. Bhargavan, Karthikeyan; Delignat-Lavaud, Antoine; Maffeis, Sergio: Defensive javascript: building and verifying secure web components (2014)
  16. Blanchet, Bruno: Automatic verification of security protocols in the symbolic model: the verifier proverif (2014)
  17. Hoang, T. S.; McIver, A. K.; Meinicke, L.; Morgan, C. C.; Sloane, A.; Susatyo, E.: Abstractions of non-interference security: probabilistic versus possibilistic (2014)
  18. Bansal, Chetan; Bhargavan, Karthikeyan; Delignat-Lavaud, Antoine; Maffeis, Sergio: Keys to the cloud: formal analysis and concrete attacks on encrypted web storage (2013) ioport
  19. Baudet, Mathieu; Cortier, Véronique; Delaune, Stéphanie: YAPA: a generic tool for computing intruder knowledge (2013)
  20. Cheval, Vincent; Blanchet, Bruno: Proving more observational equivalences with ProVerif (2013)

1 2 next