-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy path0_abstract.tex
10 lines (9 loc) · 1.1 KB
/
0_abstract.tex
1
2
3
4
5
6
7
8
9
10
\begin{abstract}
Security protocols are crucial for protecting sensitive information and communications in today's digital age. Even a minor flaw in how these protocols are implemented can lead to serious consequences.
Hence, proving the implementations secure is attractive as we prove the absence of such flaws.
Arquint et al.~\cite{ArquintSchwerhoffMehtaMueller23} propose a generic and modular methodology to verify the security of protocol implementations.
We extend their methodology to reason about ephemeral and time-sensitive data, which must be deleted within certain time frames.
This enhancement allows us to verify strong security properties, such as forward secrecy and post-compromise security, for protocols that frequently renew their keys, such as Signal.
Our contributions encompass a conceptual expansion of their methodology and an extension of their Go library, which simplifies the verification of protocol implementations in Go.
A case study, featuring a Signal-like protocol implementation, showcases expressiveness and practical applicability of our methodology extension.
\end{abstract}