Filters








5,601 Hits in 7.0 sec

Automated Logic-Based Technique for Formal Verification of Security Protocols

Anca D. Jurcut
2018 Journal of Advances in Computer Networks  
The design of secure protocols is complex and prone to error.  ...  Further, a prototype implementation of the attack detection logic theory is introduced.  ...  Empirical results on verifying a range of security protocols using the automated prototype implementation of the Attack Detection Logic are also presented.  ... 
doi:10.18178/jacn.2018.6.2.258 fatcat:jqd45l67yndojhru5tjhjafciy

Tools for model-based security engineering

Jan Jürjens, Jorge Fox
2006 Proceeding of the 28th international conference on Software engineering - ICSE '06  
Advanced users can use this open-source framework to implement verification routines for the constraints of selfdefined security requirements.  ...  We focus on a verification routine that automatically verifies crypto-based software for security requirements by using automated theorem provers.  ...  BAN logic is a modal belief logic used to formulate the beliefs of protocol participants during protocol execution.  ... 
doi:10.1145/1134285.1134423 dblp:conf/icse/JurjensF06 fatcat:amyu7yvrjvg4bgin5atfaidcce

Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification

S Gritzalis, D Spinellis, P Georgiadis
1999 Computer Communications  
Recent research work focuses on the ex-ante use of formal methods in the design state of new security protocols, as the synthesis approach.  ...  Formal methods, theory, and supporting tools can aid the design, analysis, and verification of the security-related and cryptographic protocols used over open networks and distributed systems.  ...  Acknowledgements The authors would like to thank C. Meadows, Naval Research Laboratory, S.H. Brackin, ARCA Systems, Inc., L.C. Paulson, University of Cambridge, C.  ... 
doi:10.1016/s0140-3664(99)00030-4 fatcat:cv3vmaztf5drxc2edllnfgefva

Establishing and fixing a freshness flaw in a key-distribution and Authentication Protocol

Reiner Dojen, Ioana Lasc, Tom Coffey
2008 2008 4th International Conference on Intelligent Computer Communication and Processing  
Traditionally, security protocols have been designed and verified using informal techniques. However, the absence of formal verification can lead to security errors remaining undetected.  ...  This paper establishes a freshness flaw in a keydistribution and Authentication Protocol using an automated logic-based verification engine.  ...  Fig. 1 ) is an automated system that implements a modal logic of knowledge and belief using Layered Proving Trees [1] .  ... 
doi:10.1109/iccp.2008.4648371 fatcat:mywdwionanhixc55yohbl3baau

On the security verification of a short message service protocol

Anca Delia Jurcut, Madhusanka Liyanage, Jinyong Chen, Cornelia Gyorodi, Jingsha He
2018 2018 IEEE Wireless Communications and Networking Conference (WCNC)  
In this paper, MSCP is formally analyzed using an automated logic-based verification tool with attack detection capabilities.  ...  To provide such security features, a high security communication protocol for SMS, called Message Security Communication Protocol (MSCP) was proposed.  ...  In this paper, the process of formally verifying a security protocol based on modal logic technique was introduced.  ... 
doi:10.1109/wcnc.2018.8377349 dblp:conf/wcnc/JurcutLCGH18 fatcat:5jwbhfjuwvg3ljktlzuyym4w7e

Automation-Considered Logic of Authentication and Key Distribution [chapter]

Taekyoung Kwon, Seongan Lim
2004 Lecture Notes in Computer Science  
This paper presents an automation-considered logic of authentication for reasoning about principals' belief on authentication and key distribution protocols.  ...  As an experimental study, we implemented the proposed logic to a semiautomated formal verification tool, and analyzed several protocols.  ...  Acknowledgement This work was supported in part by R&D project 2002-S-073 of Korea Information Security Agency.  ... 
doi:10.1007/978-3-540-24591-9_33 fatcat:jd4gj4hshja2hkrvuwwirc767e

Formal Verification of Payment protocol using AVISPA

A.R. Rizwana Shaikh, Satish Devane
2010 International Journal for Infonomics  
AVISPA is one of the evolving tools used mainly for verifying security properties. A newly designed electronic payment protocol is verified for its correctness and security properties.  ...  Also it presents the use of AVISPA for verifying the security properties of the newly evolved electronic transaction protocol.  ...  Protocols Verified by Using AVISPA AVISPA is the acronym for Automated Validation of Internet Security Protocol and Applications.  ... 
doi:10.20533/iji.1742.4712.2010.0035 fatcat:72g7exi4c5ejriugnapb5vb6ky

Automatic Generation of Certifiable Space Communication Software

Johann Schumann, Ewen Denney
2007 2007 IEEE Aerospace Conference  
Automatic, tamper-proof formal certification techniques are used to provide explicit guarantees about important reliability and security properties and the absence of implementation errors.  ...  Smooth control of spacecraft and the downlink of mission and science data rely heavily on reliable means of communication.  ...  The BAN logic is a multi-sorted modal logic of belief.  ... 
doi:10.1109/aero.2007.352903 fatcat:2u2p5l6zyfeb5hpmtqwtyxfvde

Network Security and Metrology: A Survey

Reham Abdellatif Abouhogail
2015 International Journal of Security and Its Applications  
In this type, the traffic is categorized according to data types, protocols (TCP, ICMP, UDP, etc.), sender or receiver. The results are used to help the management of the traffic.  ...  From the other side, network security has a great effect on developing the science of metrology. In the present paper, many trends are introduced including the two viewpoints.  ...  The automated system uses the CS modal logic implemented on a layered proving tree-based proving engine.  ... 
doi:10.14257/ijsia.2015.9.11.24 fatcat:djmnz23de5dz5fa67kx77jgsza

Applying Formal Methods to Networking: Theory, Techniques, and Applications

Junaid Qadir, Osman Hasan
2015 IEEE Communications Surveys and Tutorials  
This has also led to a great resurgence in interest of applying formal methods to specification, verification, and synthesis of networking protocols and applications.  ...  The lack of formalization of the Internet architecture meant limited abstractions and modularity, especially for the control and management planes, thus requiring for every new need a new protocol built  ...  In order to prove the correctness of security protocols, two security protocol models are used (the details of which are outside the scope of this paper).  ... 
doi:10.1109/comst.2014.2345792 fatcat:oc6l6pn4tnddjbbr5v4gbbuycq

Formal Methods in Information Security

AJAYI ADEBOWALE, NICULAE GOGA, OTUSILE OLUWABUKOLA, ABEL SAMUEL
2015 INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY  
paper describes the state of the art in the industrial use of formal methods ininformation security with a focus on verification of security protocols.  ...  Based on this, we discuss issues surrounding the industrial adoption of formal methods in security protocol engineering.  ...  That said, on most protocols the tool terminates giving useful results, which makes it one of the most used automated tools now available for verifying security protocols.  ... 
doi:10.24297/ijct.v14i4.1963 fatcat:s7ratzapovh6jgax26zbpsct2e

Privacy-aware proof-carrying authorization

Matteo Maffei, Kim Pecina
2011 Proceedings of the ACM SIGPLAN 6th Workshop on Programming Languages and Analysis for Security - PLAS '11  
The former are used to witness the validity of logical formulas, the latter to selectively hide sensitive data.  ...  The usage of digital signatures, however, has a serious drawback, i.e., sensitive data are leaked to the verifier, which severely limits the applicability of PCA.  ...  Acknowledgement This work was partially supported by the initiative for excellence and the Emmy Noether program of the German federal government.  ... 
doi:10.1145/2166956.2166963 dblp:conf/pldi/MaffeiP11 fatcat:nqd3czftybbyfbxv24d2ech6ee

Establishing and Fixing Security Protocols Weaknesses Using a Logic-based Verification Tool

Anca D. Jurcut, Tom Coffey, Reiner Dojen
2013 Journal of Communications  
This paper discusses the process of formal verification using a logic-based verification tool.  ...  The verification tool with attack detection capabilities is introduced, and the verification process is demonstrated by way of a case study on two published security protocols that provide mutual authentication  ...  Fig. 1 ) is a new automated system that implements a modal logic of knowledge and an attack detection theory. The tool uses a proving engine based on Layered Proving Trees concept [1] .  ... 
doi:10.12720/jcm.8.11.795-805 fatcat:cok5aynveff2ffiuv3256sivom

Conference Report: Compass-95 - 10th Annual Conference on Computer Assurance - Gaithersburg, Md, June 26-30, 1995

B.P. Danner, L.M. Ippolito, D.R. Wallace
1995 Journal of Research of the National Institute of Standards and Technology  
He applied modal process logic, a generalization of the process algebra CCS, to the verification of an industrial failurerecovery protocol in the air traffic control domain.  ...  The authors modeled and verified a Vital Processor Interlocking using the process algebraic language muCRL and automated tools.  ... 
doi:10.6028/jres.100.045 pmid:29151764 pmcid:PMC4887224 fatcat:hgvrdig34vamzdteis76qsrcwi

Believing the Integrity of a System

Simon N. Foley
2005 Electronical Notes in Theoretical Computer Science  
Traditional models of protection tend to define integrity in terms of ad-hoc authorisation techniques whose effectiveness are justified more on the basis of experience and "best practice" rather than on  ...  This paper examines the meaning of integrity and and describes a simple belief logic approach for analysing the integrity of a system configuration.  ...  Development and implementation of the Theory Generation encoding of the Simple Logic verifier was by Daithi O'Crualaoich and its adaptation to an automatic protocol generator by Hongbin Zhou.  ... 
doi:10.1016/j.entcs.2004.09.037 fatcat:yn6kvlm3knd4rm5l6j2rzsraoi
« Previous Showing results 1 — 15 out of 5,601 results