<s>
ProVerif	B-Application
is	O
a	O
software	O
tool	O
for	O
automated	O
reasoning	O
about	O
the	O
security	O
properties	O
found	O
in	O
cryptographic	B-Protocol
protocols	I-Protocol
.	O
</s>
<s>
ProVerif	B-Application
has	O
been	O
used	O
in	O
the	O
following	O
case	O
studies	O
,	O
which	O
include	O
the	O
security	O
analysis	O
of	O
actual	O
network	O
protocols	O
:	O
</s>
<s>
Abadi	O
,	O
Blanchet	O
&	O
Fournet	O
analyse	O
the	O
Just	O
Fast	O
Keying	O
protocol	O
,	O
which	O
was	O
one	O
of	O
the	O
candidates	O
to	O
replace	O
Internet	B-Protocol
Key	I-Protocol
Exchange	I-Protocol
(	O
IKE	O
)	O
as	O
the	O
key	O
exchange	O
protocol	O
in	O
IPsec	B-Protocol
,	O
by	O
combining	O
manual	O
proofs	O
with	O
ProVerif	B-Application
proofs	O
of	O
correspondence	O
and	O
equivalence	O
.	O
</s>
<s>
use	O
ProVerif	B-Application
to	O
analyse	O
cryptographic	B-Protocol
protocol	I-Protocol
implementations	O
written	O
in	O
the	O
F	B-Operating_System
Sharp	I-Operating_System
(	O
programming	O
language	O
)	O
;	O
in	O
particular	O
the	O
Transport	B-Protocol
Layer	I-Protocol
Security	I-Protocol
(	O
TLS	O
)	O
protocol	O
has	O
been	O
studied	O
in	O
this	O
manner	O
.	O
</s>
<s>
Delaune	O
,	O
Ryan	O
&	O
Smyth	O
and	O
Backes	O
,	O
Maffei	O
&	O
Unruh	O
analyse	O
the	O
anonymity	O
properties	O
of	O
the	O
trusted	O
computing	O
scheme	O
Direct	B-Application
Anonymous	I-Application
Attestation	I-Application
(	O
DAA	O
)	O
using	O
observational	O
equivalence	O
.	O
</s>
<s>
Kusters	O
&	O
Truderung	O
examine	O
protocols	O
with	O
Diffie-Hellman	B-Protocol
exponentiation	O
and	O
XOR	B-Application
.	O
</s>
<s>
Google	O
verified	O
its	O
transport	O
layer	O
protocol	O
ALTS	B-Protocol
.	O
</s>
<s>
The	O
Tamarin	B-Application
Prover	I-Application
is	O
a	O
modern	O
alternative	O
to	O
ProVerif	B-Application
,	O
with	O
excellent	O
support	O
for	O
Diffie-Hellman	B-Protocol
equational	O
reasoning	O
,	O
and	O
verification	O
of	O
observational	O
equivalence	O
properties	O
.	O
</s>
