Runtime verification for trustworthy secure shell deployment.
Axel CurmiChristian ColomboMark VellaPublished in: VORTEX@ISSTA (2021)
Keyphrases
- cryptographic protocols
- integrity verification
- model checking
- high security
- method invocation
- verification method
- security issues
- formal verification
- face verification
- security analysis
- signature verification
- functional verification
- security requirements
- security mechanisms
- encryption scheme
- formal analysis
- java card
- formal methods
- key agreement protocol
- key exchange protocol
- multi party