ETAPS 2017

2017 European Joint Conferences on Theory and Practice of Software (ETAPS), April 22–29, 2017, Uppsala, Sweden

Desktop Layout

Secure Composition of Security Protocols (Tutorial 1) (Veronique Cortier)
Stora Salen, 6th Floor
Secure Composition of Security Protocols (Tutorial 1)
Veronique Cortier
(CNRS, France)
Abstract: Cryptographic protocols aim at securing communications over insecure networks like the Internet. Over the past decades, numerous decision procedures and tools have been developed to automatically analyse security protocols. The field has now reached a good level of maturity with efficient techniques for protocols analyzed in isolation. However, protocols are typically built using several sub-protocols and tools do not scale well for complex protocols. In this tutorial, we will present formal models for security protocols and explore when it is possible to securely (and formally) compose protocols, in several scenarios, such as long-term key sharing, symmetric and asymmetric key distribution, secure channels. Bio: Véronique Cortier is CNRS research director at Loria (Nancy, France). In 2003, she received her Ph.D. degree in Computer Science from the École Normale Supérieure de Cachan, from which she graduated. Her research focuses on formal verification of security protocols, in particular e-voting, using formal techniques such as first order logic or rewriting. She has co-authored more than 80 publications on these topics. In 2010, she was awarded an ERC starting grant and in 2015, she received the INRIA - Académie des Sciences young researcher award.


Time stamp: 2019-04-25T08:26:21+02:00