Filters








4 Hits in 3.3 sec

An Analysis of the CAVES Attestation Protocol using CPSA [article]

John D. Ramsdell and Joshua D. Guttman and Jonathan K. Millen and Brian O'Hanlon
2012 arXiv   pre-print
This paper describes the CAVES attestation protocol and presents a tool-supported analysis showing that the runs of the protocol achieve stated goals.  ...  The goals are stated formally by annotating the protocol with logical formulas using the rely-guarantee method. The protocol analysis tool used is the Cryptographic Protocol Shape Analyzer.  ...  The protocol analysis tool used is the Cryptographic Protocol Shape Analyzer (CPSA) [4] .  ... 
arXiv:1207.0418v1 fatcat:vlpb3xikl5gzpcskdggyxul3za

Principles of remote attestation

George Coker, Joshua Guttman, Peter Loscocco, Amy Herzog, Jonathan Millen, Brian O'Hanlon, John Ramsdell, Ariel Segall, Justin Sheehy, Brian Sniffen
2011 International Journal of Information Security  
Remote attestation is the activity of making a claim about properties of a target by supplying evidence to an appraiser over a network.  ...  We illustrate how to acquire evidence from a running system, and how to transport it via protocols to remote appraisers. We propose an architecture for attestation guided by these principles.  ...  We have analyzed this protocol in detail using CPSA. CPSA is a Cryptographic Protocol Shapes Analyzer [9] , and it was extremely useful in the process of refining CAVES.  ... 
doi:10.1007/s10207-011-0124-7 fatcat:ljsl65m5cbhdjhkeaaao2dsbzu

Formal Methods Analysis of the Secure Remote Password Protocol [article]

Alan T. Sherman, Erin Lanus, Moses Liskov, Edward Zieglar, Richard Chang, Enis Golaszewski, Ryan Wnuk-Fink, Cyrus J. Bonyadi, Mario Yaksetig,, Ian Blumenfeld
2020 arXiv   pre-print
We analyze the Secure Remote Password (SRP) protocol for structural weaknesses using the Cryptographic Protocol Shapes Analyzer (CPSA) in the first formal analysis of SRP (specifically, Version 3).  ...  We conceived of this attack before we used CPSA and confirmed it by generating corresponding execution shapes using CPSA.  ...  Acknowledgments Thanks to John Ramsdell (MITRE) and other participants at the Protocol eXchange for fruitful interactions. This research was supported in part by the U.S.  ... 
arXiv:2003.07421v1 fatcat:7prpthejuna2dnysxwdfn5nkrq

Formal Methods Analysis of the Secure Remote Password Protocol [article]

Alan T. Sherman, Erin Lanus, Moses Liskov, Edward Zieglar, Richard Chang, Enis Golaszewski, Ryan Wnuk-Fink, Cyrus J. Bonyadi, Mario Yaksetig, Ian Blumenfeld, Maryland Shared Open Access Repository, Maryland Shared Open Access Repository
2020
We analyze the Secure Remote Password (SRP) protocol for structural weaknesses using the Cryptographic Protocol Shapes Analyzer (CPSA) in the first formal analysis of SRP (specifically, Version 3).  ...  We conceived of this attack before we used CPSA and confirmed it by generating corresponding execution shapes using CPSA.  ...  Acknowledgments Thanks to John Ramsdell (MITRE) and other participants at the Protocol eXchange for fruitful interactions. This research was supported in part by the U.S.  ... 
doi:10.13016/m2qmyh-lfry fatcat:wpuvqqru5rg4bina34cndeltda