<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462017000100101</article-id>
<article-id pub-id-type="doi">10.13053/cys-21-1-2483</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[A Model Checker for the Verification of Browser Based Protocols]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Ferman]]></surname>
<given-names><![CDATA[Victor]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Hutter]]></surname>
<given-names><![CDATA[Dieter]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Monroy]]></surname>
<given-names><![CDATA[Raúl]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Tecnologico de Monterrey Escuela de Ingeniería y Ciencias ]]></institution>
<addr-line><![CDATA[Atizapán de Zaragoza Estado de México]]></addr-line>
<country>Mexico</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universität Bremen German Research Center for Artificial Intelligence ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Germany</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>03</month>
<year>2017</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>03</month>
<year>2017</year>
</pub-date>
<volume>21</volume>
<numero>1</numero>
<fpage>101</fpage>
<lpage>114</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462017000100101&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462017000100101&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462017000100101&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: A browser based protocol is the chief security component of a safety critical web application, such as e-banking. Accordingly, browser based protocols need to be thoroughly verified in order to guarantee they are up to comply with key security properties. To this end, we have developed WebMC, a model checker especially designed to consider web standards, with the aim of analyzing browser based protocol execution, as encompassed by the interactions of a typical user, a browser, and active attacker playing the role of the network, and one or more servers. In this paper, we shall show how to use WebMC in the design and the development of browser based protocols. Our tool has been successfully validated: WebMC has been able to reproduce a number of the verification results found in the literature, but fully automatically.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Model checking]]></kwd>
<kwd lng="en"><![CDATA[browser based protocols]]></kwd>
<kwd lng="en"><![CDATA[security protocols]]></kwd>
<kwd lng="en"><![CDATA[formal methods]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Armando]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Carbone]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Compagna]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Cuellar]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Tobarra]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Formal analysis of saml 2.0 web browser single sign-on: breaking the saml-based single sign-on for google apps]]></source>
<year>2008</year>
<conf-name><![CDATA[ Proceedings of the 6th ACM workshop on Formal methods in security engineering, FMSE &#8217;08]]></conf-name>
<conf-loc>New York, NY, USA </conf-loc>
<page-range>1-10</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Ofmc: A symbolic model checker for security protocols]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Basin]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Mödersheim]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Viganò]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[International Journal of Information Security]]></source>
<year>2005</year>
<volume>4</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>181-208</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Graph-based algorithms for boolean function manipulation]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bryant]]></surname>
<given-names><![CDATA[R. E.]]></given-names>
</name>
</person-group>
<source><![CDATA[IEEE Transactions on computers]]></source>
<year>1986</year>
<volume>100</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>677-91</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fett]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Kusters]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Schmitz]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[An expressive model for the web infrastructure: Definition and application to the browser id sso system]]></source>
<year>2014</year>
<conf-name><![CDATA[ Security and Privacy (SP), 2014 IEEE Symposium on]]></conf-name>
<conf-loc> </conf-loc>
<page-range>673-88</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gajek]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Manulis]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Sadeghi]]></surname>
<given-names><![CDATA[A.-R.]]></given-names>
</name>
<name>
<surname><![CDATA[Schwenk]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Provably secure browser-based user-aware mutual authentication over tls]]></source>
<year>2008</year>
<conf-name><![CDATA[ Proceedings of the 2008 ACM symposium on Information, computer and communications security, ASIACCS &#8217;08]]></conf-name>
<conf-loc>New York, NY, USA </conf-loc>
<page-range>300-11</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Validating a web service security abstraction by typing]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gordon]]></surname>
<given-names><![CDATA[A. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Pucella]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Formal Aspects of Computing]]></source>
<year>2005</year>
<volume>17</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>277-318</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Groß]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Security analysis of the saml single sign-on browser/artifact profile]]></source>
<year>2003</year>
<conf-name><![CDATA[ Proceedings of the 19th Annual Computer Security Applications Conference, ACSAC &#8217;03]]></conf-name>
<conf-loc>Washington, DC, USA </conf-loc>
<page-range>298-307</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Groß]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Pfitzmann]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Sadeghi]]></surname>
<given-names><![CDATA[A.-R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Browser model for security analysis of browser-based protocols]]></source>
<year>2005</year>
<conf-name><![CDATA[ Proceedings of the 10th European conference on Research in Computer Security, ESORICS&#8217;05]]></conf-name>
<conf-loc>Heidelberg, Berlin </conf-loc>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Groß]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Pfitzmann]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Sadeghi]]></surname>
<given-names><![CDATA[A.-R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Proving a ws-federation passive requestor profile with a browser model]]></source>
<year>2005</year>
<conf-name><![CDATA[ Proceedings of the 2005 Workshop on Secure Web Services, SWS &#8217;05]]></conf-name>
<conf-loc>New York, NY, USA </conf-loc>
<page-range>54-64</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Katzenbeisser]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Weippl]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Camp]]></surname>
<given-names><![CDATA[L. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Volkamer]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Reiter]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<source><![CDATA[A belief logic for analyzing security of web protocols]]></source>
<year>2012</year>
<conf-name><![CDATA[ Trust and Trustworthy Computing: 5th International Conference, TRUST 2012]]></conf-name>
<conf-date>June 13-15, 2012</conf-date>
<conf-loc>Vienna, Austria </conf-loc>
<page-range>239-54</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A lightweight formal approach for analyzing security of web protocols]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Stavrou]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Bos]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Portokalidis]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Research in Attacks, Intrusions and Defenses]]></source>
<year>2014</year>
<page-range>192-211</page-range><publisher-name><![CDATA[Springer International Publishing]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Formal support to security protocol development: A survey]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Monroy]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Lopez Pimentel]]></surname>
<given-names><![CDATA[J. C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Computación y Sistemas]]></source>
<year>2008</year>
<volume>12</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>89- 108</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Muthiyah]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[How I Hacked Your Facebook Photos - Deleting any photo albums]]></source>
<year>2015</year>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pfitzmann]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Waidner]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[A model for asynchronous reactive systems and its application to secure message transmission]]></source>
<year>2001</year>
<conf-name><![CDATA[ Proceedings of the 2001 IEEE Symposium on Security and Privacy, number May in SP &#8217;01]]></conf-name>
<conf-loc>Washington, DC, USA </conf-loc>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Automated security protocol analysis with the avispa tool]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Viganò]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Electron. Notes Theor. Comput. Sci.]]></source>
<year>2006</year>
<volume>155</volume>
<page-range>61-86</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
