Sciweavers

Share
ACSAC
2005
IEEE

Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers

10 years 4 months ago
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authenticity of data are notoriously hard to establish, especially in the context of cryptographic interactions. A lot of research has been devoted to deformal techniques to analyze abstract specifications of cryptographic protocols. Less attention has been paid to the analysis of cryptoprotocol implementations, for which a formal link to specifications is often not available. In this paper, we apply an approach to determine security goals provided by a C implementation to a industrially-strength biometric authentication system. Our approach is based on control flow graphs and automated theorem provers for first-order logic.
Jan Jürjens
Added 24 Jun 2010
Updated 24 Jun 2010
Type Conference
Year 2005
Where ACSAC
Authors Jan Jürjens
Comments (0)
books