Skip to main content

Showing 1–5 of 5 results for author: Sprenger, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.06074  [pdf, other

    cs.CR cs.NI cs.PL

    Protocols to Code: Formal Verification of a Next-Generation Internet Router

    Authors: João C. Pereira, Tobias Klenze, Sofia Giampietro, Markus Limbeck, Dionysios Spiliopoulos, Felix A. Wolf, Marco Eilers, Christoph Sprenger, David Basin, Peter Müller, Adrian Perrig

    Abstract: We present the first formally-verified Internet router, which is part of the SCION Internet architecture. SCION routers run a cryptographic protocol for secure packet forwarding in an adversarial environment. We verify both the protocol's network-wide security properties and low-level properties of its implementation. More precisely, we develop a series of protocol models by refinement in Isabelle… ▽ More

    Submitted 9 May, 2024; originally announced May 2024.

  2. arXiv:2402.06093  [pdf, ps, other

    cs.CR cs.LO

    Formal Verification of the Sumcheck Protocol

    Authors: Azucena Garvía Bosshard, Jonathan Bootle, Christoph Sprenger

    Abstract: The sumcheck protocol, introduced in 1992, is an interactive proof which is a key component of many probabilistic proof systems in computational complexity theory and cryptography, some of which have been deployed. However, none of these proof systems based on the sumcheck protocol enjoy a formally-verified security analysis. In this paper, we make progress in this direction by providing a formall… ▽ More

    Submitted 8 February, 2024; originally announced February 2024.

    Comments: Full version of CSF 2024 paper

  3. arXiv:2212.04171  [pdf, ps, other

    cs.CR cs.PL

    Sound Verification of Security Protocols: From Design to Interoperable Implementations (extended version)

    Authors: Linard Arquint, Felix A. Wolf, Joseph Lallemand, Ralf Sasse, Christoph Sprenger, Sven N. Wiesner, David Basin, Peter Müller

    Abstract: We provide a framework consisting of tools and metatheorems for the end-to-end verification of security protocols, which bridges the gap between automated protocol verification and code-level proofs. We automatically translate a Tamarin protocol model into a set of I/O specifications expressed in separation logic. Each such specification describes a protocol role's intended I/O behavior against wh… ▽ More

    Submitted 8 December, 2022; originally announced December 2022.

  4. Igloo: Soundly Linking Compositional Refinement and Separation Logic for Distributed System Verification

    Authors: Christoph Sprenger, Tobias Klenze, Marco Eilers, Felix A. Wolf, Peter Müller, Martin Clochard, David Basin

    Abstract: Lighthouse projects such as CompCert, seL4, IronFleet, and DeepSpec have demonstrated that full verification of entire systems is feasible by establishing a refinement relation between an abstract system specification and an executable implementation. Existing approaches however impose severe restrictions on either the abstract system specifications due to their limited expressiveness or versatili… ▽ More

    Submitted 9 October, 2020; originally announced October 2020.

  5. SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust

    Authors: Laurent Chuat, AbdelRahman Abdou, Ralf Sasse, Christoph Sprenger, David Basin, Adrian Perrig

    Abstract: The ability to quickly revoke a compromised key is critical to the security of any public-key infrastructure. Regrettably, most traditional certificate revocation schemes suffer from latency, availability, or privacy problems. These problems are exacerbated by the lack of a native delegation mechanism in TLS, which increasingly leads domain owners to engage in dangerous practices such as sharing t… ▽ More

    Submitted 20 April, 2020; v1 submitted 25 June, 2019; originally announced June 2019.

    Comments: IEEE European Symposium on Security and Privacy (EuroS&P) 2020