• English
  • Deutsch
  • Log In
    Password Login
    Research Outputs
    Fundings & Projects
    Researchers
    Institutes
    Statistics
Repository logo
Fraunhofer-Gesellschaft
  1. Home
  2. Fraunhofer-Gesellschaft
  3. Konferenzschrift
  4. Extracting and verifying cryptographic models from C protocol code by symbolic execution
 
  • Details
  • Full
Options
2011
Conference Paper
Title

Extracting and verifying cryptographic models from C protocol code by symbolic execution

Abstract
Consider the problem of verifying security properties of a cryptographic protocol coded in C. We propose an automatic solution that needs neither a pre-existing protocol description nor manual annotation of source code. First, symbolically execute the C program to obtain symbolic descriptions for the network messages sent by the protocol. Second, apply algebraic rewriting to obtain a process calculus description. Third, run an existing protocol analyser (ProVerif) to prove security properties or find attacks. We formalise our algorithm and appeal to existing results for ProVerif to establish computational soundness under suitable circumstances. We analyse only a single execution path, so our results are limited to protocols with no significant branching. The results in this paper provide the first computationally sound verification of weak secrecy and authentication for (single execution paths of) C code.
Author(s)
Aizatulin, M.
Gordon, A.D.
Jürjens, J.
Mainwork
CCS 2011, 18th ACM Conference on Computer and Communications Security. Proceedings  
Conference
Conference on Computer and Communications Security (CCS) 2011  
Open Access
DOI
10.1145/2046707.2046745
Additional link
Full text
Language
English
Fraunhofer-Institut für Software- und Systemtechnik ISST  
  • Cookie settings
  • Imprint
  • Privacy policy
  • Api
  • Contact
© 2024