Galois s2n Logo

Galois s2n

Formal verification of Amazon's s2n TLS library using SAW and Cryptol

Visit website
Claim and verify your listing
0
CybersecRadarsCybersecRadars

Go Beyond the Directory. Track the Entire Market.

Monitor competitor funding, hiring signals, product launches, and market movements across the whole industry.

Competitor Tracking·Funding Intelligence·Hiring Signals·Real-time Alerts

Galois s2n Description

Galois s2n is a formal verification project that proves the correctness of Amazon's s2n TLS library implementations. The project uses Galois' Software Analysis Workbench (SAW) to demonstrate equivalence between specifications written in the Cryptol language and the C code of s2n. The verification covers the implementation of the keyed-Hash Message Authentication Code (HMAC) algorithm and the Deterministic Random Bit Generator (DRBG). The project reduces reasoning about 103 lines of HMAC code to 3 lines of Cryptol by proving equivalence between the Cryptol implementation and C program, then performing further reasoning using the mathematical Cryptol program. The verification process is automated and integrated into Amazon's continuous integration system, running automatically with each code change. The proofs often remain intact despite changes to the software. The tools are integrated into the s2n build environment, allowing anyone with prerequisites to run the same proofs on their own version of the s2n code. The project includes automated reporting of statistics from verification runs, making the formal methods work understandable to those without a formal methods background. A tool scrapes the continuous integration system to compile useful statistics that can be viewed live.

Galois s2n FAQ

Common questions about Galois s2n including features, pricing, alternatives, and user reviews.

Galois s2n is Formal verification of Amazon's s2n TLS library using SAW and Cryptol developed by Galois. It is a Application Security solution designed to help security teams with TLS, Static Analysis, Code Security.

Have more questions? Browse our categories or search for specific tools.

FEATURED

Heeler Application Security Auto-Remediation Logo

Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

Mandos Fractional CISO Logo

Fractional CISO services for B2B companies to build security programs

POPULAR

RoboShadow Logo

Automated vulnerability assessment and remediation platform

13
OSINTLeak Real-time OSINT Leak Intelligence Logo

Real-time OSINT monitoring for leaked credentials, data, and infrastructure

8
Cybersec Feeds Logo

A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.

6
TestSavant AI Security Assurance Platform Logo

AI security assurance platform for red-teaming, guardrails & compliance

5
Mandos Brief Logo

Weekly cybersecurity newsletter covering security incidents, AI, and leadership

5
View Popular Tools →

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox