Formal verification of misbinding attacks on secure device pairing and bootstrapping.
Aleksi PeltonenMohit SethiTuomas AuraPublished in: J. Inf. Secur. Appl. (2020)
Keyphrases
- formal verification
- cryptographic protocols
- model checking
- secure routing
- security protocols
- security mechanisms
- model checker
- chosen plaintext
- stream cipher
- security measures
- bounded model checking
- symbolic model checking
- security flaws
- cryptographic algorithms
- automated verification
- security threats
- security issues
- program slicing
- countermeasures
- authentication scheme
- block cipher
- ad hoc networks
- unauthorized access
- temporal logic
- key management
- information extraction
- remote server
- sensitive data
- information leakage
- smart card
- secret key
- security analysis
- security requirements
- artificial intelligence