The Internet Archive has a preservation copy of this work in our general collections.
The file type is application/pdf
.
Filters
An Analysis of the CAVES Attestation Protocol using CPSA
[article]
2012
arXiv
pre-print
This paper describes the CAVES attestation protocol and presents a tool-supported analysis showing that the runs of the protocol achieve stated goals. ...
The goals are stated formally by annotating the protocol with logical formulas using the rely-guarantee method. The protocol analysis tool used is the Cryptographic Protocol Shape Analyzer. ...
The protocol analysis tool used is the Cryptographic Protocol Shape Analyzer (CPSA) [4] . ...
arXiv:1207.0418v1
fatcat:vlpb3xikl5gzpcskdggyxul3za
Principles of remote attestation
2011
International Journal of Information Security
Remote attestation is the activity of making a claim about properties of a target by supplying evidence to an appraiser over a network. ...
We illustrate how to acquire evidence from a running system, and how to transport it via protocols to remote appraisers. We propose an architecture for attestation guided by these principles. ...
We have analyzed this protocol in detail using CPSA. CPSA is a Cryptographic Protocol Shapes Analyzer [9] , and it was extremely useful in the process of refining CAVES. ...
doi:10.1007/s10207-011-0124-7
fatcat:ljsl65m5cbhdjhkeaaao2dsbzu
Formal Methods Analysis of the Secure Remote Password Protocol
[article]
2020
arXiv
pre-print
We analyze the Secure Remote Password (SRP) protocol for structural weaknesses using the Cryptographic Protocol Shapes Analyzer (CPSA) in the first formal analysis of SRP (specifically, Version 3). ...
We conceived of this attack before we used CPSA and confirmed it by generating corresponding execution shapes using CPSA. ...
Acknowledgments Thanks to John Ramsdell (MITRE) and other participants at the Protocol eXchange for fruitful interactions. This research was supported in part by the U.S. ...
arXiv:2003.07421v1
fatcat:7prpthejuna2dnysxwdfn5nkrq
Formal Methods Analysis of the Secure Remote Password Protocol
[article]
2020
We analyze the Secure Remote Password (SRP) protocol for structural weaknesses using the Cryptographic Protocol Shapes Analyzer (CPSA) in the first formal analysis of SRP (specifically, Version 3). ...
We conceived of this attack before we used CPSA and confirmed it by generating corresponding execution shapes using CPSA. ...
Acknowledgments Thanks to John Ramsdell (MITRE) and other participants at the Protocol eXchange for fruitful interactions. This research was supported in part by the U.S. ...
doi:10.13016/m2qmyh-lfry
fatcat:wpuvqqru5rg4bina34cndeltda