$\text{DY}^{\star}$: A Modular Symbolic Verification Framework for Executable Cryptographic Protocol Code

Author(s):  
Karthikeyan Bhargavan ◽  
Abhishek Bichhawat ◽  
Quoc Huy Do ◽  
Pedram Hosseyni ◽  
Ralf Kusters ◽  
...  
2012 ◽  
Vol 77 (10-11) ◽  
pp. 1122-1150 ◽  
Author(s):  
Werner Damm ◽  
Henning Dierks ◽  
Stefan Disch ◽  
Willem Hagemann ◽  
Florian Pigorsch ◽  
...  

Author(s):  
Parosh Aziz Abdulla ◽  
Bengt Jonsson ◽  
Mats Kindahl ◽  
Doron Peled

10.29007/gpsh ◽  
2018 ◽  
Author(s):  
Abdulbasit Ahmed ◽  
Alexei Lisitsa ◽  
Andrei Nemytykh

It has been known for a while that program transformation techniques, in particular, program specialization, can be used to prove the properties of programs automatically. For example, if a program actually implements (in a given context of use) a constant function, sufficiently powerful and semantics preserving program transformation may reduce the program to a syntactically trivial ``constant'' program, pruning unreachable branches and proving thereby the property. Viability of such an approach to verification has been demonstrated in previous works where it was applied to the verification of parameterized cache coherence protocols and Petri Nets models.In this paper we further extend the method and present a case study on its appication to the verification of a cryptographic protocol. The protocol is modeled by functional programs at different levels of abstraction and verification via program specialization is done by using Turchin's supercompilation method.


10.29007/2nr2 ◽  
2018 ◽  
Author(s):  
Alexander Letichevsky ◽  
Alexander Godlevsky ◽  
Anton Guba ◽  
Alexander Kolchin ◽  
Oleksandr Letychevskyi ◽  
...  

The paper presents the usage of invariants for symbolic verification of requirements for reactive systems. It includes checking of safety, incompleteness, liveness, consistency properties, and livelock detection. The paper describes the iterative method of double approximation and the method of undetermined coefficients for invariants generation. Benefits, disadvantages, and comparison of this technique with existing methods are considered. The paper is illustrated by examples of invariants technique usage for symbolic verification.


Sign in / Sign up

Export Citation Format

Share Document