A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Computationally sound verification of source code
2010
Proceedings of the 17th ACM conference on Computer and communications security - CCS '10
Increasing attention has recently been given to the formal verification of the source code of cryptographic protocols. The standard approach is to use symbolic abstractions of cryptography that make the analysis amenable to automation. This leaves the possibility of attacks that exploit the mathematical properties of the cryptographic algorithms themselves. In this paper, we show how to conduct the protocol analysis on the source code level (F# in our case) in a computationally sound way, i.e.,
doi:10.1145/1866307.1866351
dblp:conf/ccs/BackesMU10
fatcat:blfl4nf2wrdcpkzfbxy24vmk2q