From provable models to provable implementations: translating Alice & Bob security protocols to F*

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Deploying secure communication protocols remains a challenging task. To ensure that intended security properties hold, formal verification has become increasingly important. In this work, we present a translation from the design-oriented Alice & Bob language to the implementation-level language F*, leveraging the DY* library’s verification capabilities. Our approach addresses the expressiveness gap between abstract specifications and concrete implementations by generating verifiable DY* code that benefits from its dependent-type system. This integration of model-driven development with dependent types enables the specification and proof of security properties directly at the implementation level. As a result, users, even those without expertise in formal methods, can start from an intuitive Alice & Bob notation and obtain a formally backed implementation that can be enriched with features not expressible in Alice & Bob, while preserving correctness through re-verification. We demonstrate the effectiveness of this workflow through the generation and verification of several real-world security protocols, showcasing an end-to-end approach to verified protocol implementation.
Original languageEnglish
Title of host publicationLecture Notes in Computer Science
PublisherSpringer
Number of pages20
Publication statusAccepted/In press - 15 Nov 2025
Event18th International Symposium on Foundations & Practice of Security - Brest, France
Duration: 25 Nov 202527 Nov 2025
Conference number: 2025
https://hub.imt-atlantique.fr/fps2025/

Conference

Conference18th International Symposium on Foundations & Practice of Security
Abbreviated titleFPS
Country/TerritoryFrance
CityBrest
Period25/11/2527/11/25
Internet address

Fingerprint

Dive into the research topics of 'From provable models to provable implementations: translating Alice & Bob security protocols to F*'. Together they form a unique fingerprint.

Cite this