Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice
- David AdrianK. Bhargavan P. Zimmermann
- 12 October 2015
Computer Science
Logjam, a novel flaw in TLS that lets a man-in-the-middle downgrade connections to "export-grade" Diffie-Hellman, is presented and a close reading of published NSA leaks shows that the agency's attacks on VPNs are consistent with having achieved a break.
Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate
- K. BhargavanB. BlanchetNadim Kobeissi
- 22 May 2017
Computer Science, Engineering
A methodology for developing verified symbolic and computational models of TLS 1.3 hand-in-hand with a high-assurance reference implementation of the protocol, and presents a computational CryptoVerif model for TLS1.3 Draft-18 and proves its security.
HACL*: A Verified Modern Cryptographic Library
- J. ZinzindohouéK. BhargavanJonathan ProtzenkoB. Beurdouche
- 30 October 2017
Computer Science
HACL* implements the NaCl cryptographic API and can be used as a drop-in replacement for NaCl libraries like libsodium and TweetNaCl, showing that writing fast, verified, and usable C cryptographic libraries is now practical.
A Messy State of the Union: Taming the Composite State Machines of TLS
- B. BeurdoucheK. Bhargavan J. Zinzindohoué
- 17 May 2015
Computer Science
This work systematically test popular open-source TLS implementations for state machine bugs and discovers several critical security vulnerabilities that have lain hidden in these libraries for years, and have now finally been patched due to the disclosures.
Formal Verification of Smart Contracts: Short Paper
- K. BhargavanAntoine Delignat-Lavaud Santiago Zanella-Béguelin
- 24 October 2016
Computer Science
PLAS@CCS
This paper outlines a framework to analyze and verify both the runtime safety and the functional correctness of Ethereum contracts by translation to F*, a functional programming language aimed at program verification.
Refinement Types for Secure Implementations
- Jesper BengtsonK. BhargavanC. FournetA. GordonS. Maffeis
- 23 June 2008
Computer Science
The design and implementation of a typechecker for verifying security properties of the source code of cryptographic protocols and access control mechanisms and typechecking generates veri¿cation conditions that are passed to an SMT solver.
Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach
- Nadim KobeissiK. BhargavanB. Blanchet
- 26 April 2017
Computer Science
This work uses ProVerif and CryptoVerif to find new and previously-known weaknesses in the protocol and suggest practical countermeasures, and demonstrates that, with disciplined programming and some verification expertise, the systematic analysis of complex cryptographic web applications is now becoming practical.
Formal verification of standards for distance vector routing protocols
- K. BhargavanDavor ObradovicCarl A. Gunter
- 1 July 2002
Computer Science, Engineering
JACM
This work shows how to use an interactive theorem prover, HOL, together with a model checker, SPIN, to prove key properties of distance vector routing protocols, and develops verification techniques suited to routing protocols generally.
Discovering Concrete Attacks on Website Authorization by Formal Analysis
- Chetan BansalK. BhargavanS. Maffeis
- 25 June 2012
Computer Science
This work model several configurations of the OAuth 2.0 protocol in the applied pi-calculus and verify them using ProVerif, a new library for modeling web applications and web-based attackers that is designed to help discover concrete website attacks.
SoK: Computer-Aided Cryptography
- M. BarbosaG. Barthe Bryan Parno
- 1 May 2021
Computer Science
A cross-cutting systematization of the computer-aided cryptography literature, focusing on three main areas: (i) design-level security (both symbolic security and computational security), (ii) functional correctness and efficiency, and (iii) implementation- level security (with a focus on digital side-channel resistance).
...
...