A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Security Analysis of Crypto-based Java Programs using Automated Theorem Provers
2006
21st IEEE/ACM International Conference on Automated Software Engineering (ASE'06)
Determining the security properties satisfied by software using cryptography is difficult: Security requirements such as secrecy, integrity and authenticity of data are notoriously hard to establish, especially in the context of cryptographic interactions. Nevertheless, little attention has been paid so far to the verification of such implementations with respect to the secure use of cryptography. We propose an approach to use automated theorem provers for first-order logic to formally verify
doi:10.1109/ase.2006.60
dblp:conf/kbse/Jurjens06
fatcat:eg7yuimfgreqdp2polhzo7jgxi