Filters








336 Hits in 4.9 sec

Symbolic Models for Isolated Execution Environments

Charlie Jacomme, Steve Kremer, Guillaume Scerri
2017 2017 IEEE European Symposium on Security and Privacy (EuroS&P)  
We present a symbolic model for specifying and verifying applications that make use of such features.  ...  protocol and a one-time password protocol that all rely on such IEEs. 1.  ...  Protocol model In this section we present our formal model for specifying messages, protocols and security properties.  ... 
doi:10.1109/eurosp.2017.16 dblp:conf/eurosp/JacommeKS17 fatcat:mh42osgf4rcfvapxauq5tfx2aq

Discrete vs. Dense Times in the Analysis of Cyber-Physical Security Protocols [chapter]

Max Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov, Carolyn Talcott
2015 Lecture Notes in Computer Science  
We propose a Multiset Rewriting model with dense time suitable for specifying cyber-physical security protocols.  ...  We classify such security protocols as Cyber-Physical. Time plays a key role in design and analysis of many of these protocols.  ...  Scedrov is supported in part by the AFOSR MURI Science of Cyber Security: Modeling, Composition, and Measurement as AFOSR Grant No. FA9550-11-1-0137. Additional support for Scedrov from ONR.  ... 
doi:10.1007/978-3-662-46666-7_14 fatcat:6pwyw5jtfzfx7menj7w5mxpgiu

Automatic verification of secrecy properties for linear logic specifications of cryptographic protocols

Marco Bozzano, Giorgio Delzanno
2004 Journal of symbolic computation  
Furthermore, our approach can be used both to find attacks and to verify secrecy for a protocol. We apply our method to analyse several classical examples of authentication protocols.  ...  Our approach is well suited to verifying properties which can be specified by means of minimal conditions.  ...  Acknowledgements We would like to thank the anonymous reviewers of this paper for their helpful suggestions and advice.  ... 
doi:10.1016/j.jsc.2004.04.002 fatcat:sjmicevacfcr7orbzcxll7qdhi

Modular Preservation of Safety Properties by Cookie-Based DoS-Protection Wrappers [chapter]

Rohit Chadha, Carl A. Gunter, Jose Meseguer, Ravinder Shankesi, Mahesh Viswanathan
2008 Lecture Notes in Computer Science  
Current research on verifying security properties of communication protocols has focused on proving integrity and confidentiality using models that include a strong Man-in-the-Middle (MitM) threat.  ...  In this paper we demonstrate a modular reasoning framework in which a protocol P that satisfies certain security properties can be assured to retain these properties after it is "wrapped" in a protocol  ...  Acknowledgments The authors thank Catherine Meadows, Omid Fatemieh, and Fariba Khan for their suggestions. We also benefited from comments by anonymous reviewers.  ... 
doi:10.1007/978-3-540-68863-1_4 fatcat:t2ehmpkiubhonfnxkdya3oqphm

Distance-Bounding Protocols: Verification Without Time and Location

Sjouke Mauw, Zach Smith, Jorge Toro-Pozo, Rolando Trujillo-Rasua
2018 2018 IEEE Symposium on Security and Privacy (SP)  
In this work we introduce a causality-based characterization of secure distancebounding that discards the notions of time and location.  ...  Existing symbolic verification frameworks for distance-bounding protocols consider timestamps and the location of agents.  ...  ACKNOWLEDGMENT This work was supported by the Luxembourg National Research Fund under the grants AFR-PhD-10188265 and C15-IS-10428112.  ... 
doi:10.1109/sp.2018.00001 dblp:conf/sp/MauwSTT18 fatcat:yb27nrpmpjgejosg47yedmp46a

Automated Verification of Group Key Agreement Protocols

Benedikt Schmidt, Ralf Sasse, Cas Cremers, David Basin
2014 2014 IEEE Symposium on Security and Privacy  
We automatically verify a set of protocols, including the STR, group Joux, and GDH protocols, thereby demonstrating the effectiveness of our approach. STR Group Joux Joux  ...  Our support for AC-operators enables protocol specifications to use multisets, natural numbers, and finite maps.  ...  Adversary capabilities and protocols are specified jointly as a set of (labeled) multiset rewriting rules. Security properties are modeled as trace properties of the transition system.  ... 
doi:10.1109/sp.2014.19 dblp:conf/sp/SchmidtSCB14 fatcat:t5c3nd2mifcirbrd3rnmhqt32a

Time, computational complexity, and probability in the analysis of distance-bounding protocols

Max Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov, Carolyn Talcott
2017 Journal of Computer Security  
As a formal model for representing and analyzing Cyber-Physical properties, we propose a Multiset Rewriting model with dense time suitable for specifying cyber-physical security protocols.  ...  We classify such security protocols as Cyber-Physical. Time plays a key role in design and analysis of many of these protocols.  ...  Scedrov is supported in part by the AFOSR MURI "Science of Cyber Security: Modeling, Composition, and Measurement". Additional support for Scedrov from ONR.  ... 
doi:10.3233/jcs-0560 fatcat:yquvrtuxnja4dl5tkt6bt6u43q

Twenty Years of Rewriting Logic [chapter]

José Meseguer
2010 Lecture Notes in Computer Science  
and verification, security, real-time and cyber-physical systems, probabilistic systems, bioinformatics and chemical systems.  ...  Rewriting logic is a simple computational logic that can naturally express both concurrent computation and logical deduction with great generality.  ...  the first papers were published, for their further encouragement to turn my WRLA lecture into a survey paper, and for their patience in allowing me the necessary time to finish it.  ... 
doi:10.1007/978-3-642-16310-4_2 fatcat:ho7s76r67nc63bndpoptbh5k4e

Twenty years of rewriting logic

José Meseguer
2012 The Journal of Logic and Algebraic Programming  
and verification, security, real-time and cyber-physical systems, probabilistic systems, bioinformatics and chemical systems.  ...  Rewriting logic is a simple computational logic that can naturally express both concurrent computation and logical deduction with great generality.  ...  the first papers were published, for their further encouragement to turn my WRLA lecture into a survey paper, and for their patience in allowing me the necessary time to finish it.  ... 
doi:10.1016/j.jlap.2012.06.003 fatcat:5tx4a5uxlvapfpf5fajozkbboi

Towards a Data Centric Approach for the Design and Verification of Cryptographic Protocols [article]

Luca Arnaboldi, Roberto Metere
2019 arXiv   pre-print
The information of protocols are stored in XML, enjoying a fixed format and syntax aiming to contain all required information to specify any kind of protocol.  ...  In this paper, we showcase the effectiveness of this novel approach by demonstrating how easy MetaCP makes it to design and verify a protocol going from the graphical design to formally verified protocol  ...  ACKNOWLEDGEMENT This research is supported by The Alan Turing Institute and an Innovate UK grant to Newcastle University through the e4future project, as well as Arm Ltd. and EPSRC under grant EP/N509528  ... 
arXiv:1910.02656v1 fatcat:v5a35t4jzvfslb2eq2cszgiqba

Formalization and verification of coherence protocols with the gamma framework

Mentre, Le Metayer, Priol
2000 Proceedings International Symposium on Software Engineering for Parallel and Distributed Systems PDSE-99  
The global state of the protocol is represented as a multiset and rewriting rules are used to describe state changes.  ...  This paper presents an approach to formalize coherence protocols for shared virtual memories as multiset rewriting systems.  ...  We also thank Thomas Colcombet for commenting a draft of this paper and for providing us with a first Objective Caml interface to the CMU bddlib.  ... 
doi:10.1109/pdse.2000.847855 dblp:conf/pdse/MentreMP00 fatcat:wnd4i2nexnaw3csfgecscmzcfq

Rewriting logic: roadmap and bibliography

Narciso Martı́-Oliet, José Meseguer
2002 Theoretical Computer Science  
Acknowledgements We would like to thank all our colleagues who have given us comments on earlier versions of this roadmap and have helped us in compiling the following bibliography; we thank specially  ...  Miguel Palomino, whose extensive help has made possible the existence of the bibliography.  ...  completion; and a tool to specify, analyze and model check real-time speciÿcations [265, 262] .  ... 
doi:10.1016/s0304-3975(01)00357-7 fatcat:loych2t2vzcgjfnidkola4wvoe

Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols [chapter]

Giorgio Delzanno, Sandro Etalle
2002 Lecture Notes in Computer Science  
In this paper we define a sequent calculus to formally specify, simulate, debug and verify security protocols.  ...  Based on the results of this preliminary analysis, we have implemented a Prolog meta-interpreter which allows for rapid prototyping and for checking safety properties of security protocols, and we have  ...  Our approach combines aspects related to the multiset rewriting-based approach of [7, 8] and the declarative way of specifying protocols using logic programs taken in [2, 12] .  ... 
doi:10.1007/3-540-45607-4_5 fatcat:ywc6teis6zec7keteoce5hvyny

Symbolic Analysis of an Electric Vehicle Charging Protocol

Li Li, Jun Pang, Yang Liu, Jun Sun, Jin Song Dong
2014 2014 19th International Conference on Engineering of Complex Computer Systems  
It thus presents a challenge for formal verification, as no single existing tool for security protocol analysis support for all the required features.  ...  In our analysis, we employ and combine the strength of two stateof-the-art symbolic verifiers, Tamarin and ProVerif, to check all important properties of the protocol.  ...  We would like to thank Sjouke Mauw for his support for our research cooperation. Besides, Sun Jun is supported by project "IGDSi1301012" from SUTD.  ... 
doi:10.1109/iceccs.2014.11 dblp:conf/iceccs/LiPL0D14 fatcat:zo5uzzjtpre37i6mzml6lbjr6e

Reasoning about Concurrency for Security Tunnels

Alwyn E. Goodloe, Carl A. Gunter
2007 Computer Security Foundations Workshop (CSFW), Proceedings of the IEEE  
There has been excellent progress on languages for rigorously describing key exchange protocols and techniques for proving that the network security tunnels they establish preserve confidentiality and  ...  New problems arise in describing and analyzing establishment protocols and tunnels when they are used as building blocks to achieve high-level security goals for network administrative domains.  ...  Views expressed here are those of the authors only.  ... 
doi:10.1109/csf.2007.28 dblp:conf/csfw/GoodloeG07 fatcat:ndtmhpkdsbexrnfl52eh3k7y6i
« Previous Showing results 1 — 15 out of 336 results