A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
A logic for constraint-based security protocol analysis
2006
2006 IEEE Symposium on Security and Privacy (S&P'06)
A preliminary attempt to use logic for specifying local security properties in a constraint-based setting has been carried out [3] . ...
Inspired by this work and the successful NPATRL [11, 8] , we currently explores a variant of linear temporal logic (LTL) over finite traces, PS-LTL , standing for pure-past security LTL [5] . ...
Another direction is to characterize the expressivity power of PS-LTL compared to other security requirement languages. ...
doi:10.1109/sp.2006.3
dblp:conf/sp/CorinES06
fatcat:ooxcdxojy5gwlaaais2kd6alsu
Safely composing security protocols
2008
Formal methods in system design
This result holds for a large class of security properties that encompasses secrecy and various formulations of authentication. ⋆ This work has been partly supported by the RNTL project POSÉ and the ARA ...
Security protocols are small programs that are executed in hostile environments. ...
Writing Security Properties with PS-LTL In this section, we show how to specify several security properties in PS-LTL -. ...
doi:10.1007/s10703-008-0059-4
fatcat:vow3ijjsxvhptcscqzoxtp33ku
Safely Composing Security Protocols
[chapter]
2007
Lecture Notes in Computer Science
This result holds for a large class of security properties that encompasses secrecy and various formulations of authentication. ⋆ This work has been partly supported by the RNTL project POSÉ and the ARA ...
Security protocols are small programs that are executed in hostile environments. ...
Writing Security Properties with PS-LTL In this section, we show how to specify several security properties in PS-LTL -. ...
doi:10.1007/978-3-540-77050-3_29
fatcat:gfizaotqerb6tbadmshvgqbhna
A Static Verification Framework for Secure Peer-to-Peer Applications
2007
Second International Conference on Internet and Web Applications and Services (ICIW'07)
The approach avoids security issues to be taken into consideration as a separate layer that is added to the system as an afterthought by the use of security protocols. ...
The framework supports the specification, modeling, and analysis of security aspects together with the general characteristics of the system, during early stages of the development life-cycle. ...
Techniques for secure software code analysis and testing have been advocated in [6] [7] [30] . ...
doi:10.1109/iciw.2007.11
dblp:conf/iciw/Zisman07
fatcat:ctrexhk7hrbgxj5wxr573xhgeu
Real-Time Specification Patterns and Tools
[chapter]
2012
Lecture Notes in Computer Science
However, only a limited number of these formalisms support the definition of timing constraints. ...
This has motivated the definition of dedicated assertion languages for expressing temporal properties at a higher level. ...
The scenario involves three entities, each one managed by a service: a Clinic Service (CS); a Medical Analysis Service (MAS); and a Pharmacy Service (PS). ...
doi:10.1007/978-3-642-32469-7_1
fatcat:awks3ietmvax3byog4uraspsvq
Two Decades of Maude
[chapter]
2015
Lecture Notes in Computer Science
This paper is a tribute to José Meseguer, from the rest of us in the Maude team, reviewing the past, the present, and the future of the language and system with which we have been working for around two ...
As for a more interesting application of rewriting modulo SMT, let us consider the case of distance-bounding protocols [10] , a class of security protocols that infer an upper bound on the distance between ...
the security analysis is performed in a backwards way, from an attack state to an initial state. ...
doi:10.1007/978-3-319-23165-5_11
fatcat:cre7i55r4reg3indrng3w5fgqa
Benchmark Tests For The Model-Checking-Based IDS Algorithms
2019
IEEE Access
A fundamental concern for the security community is to identify the comprehensive comparable performance of various intrusion detection algorithms which are based on the Model Checking (MC) techniques. ...
It is beneficial for selecting the suitable MC-based algorithms in actual deployment of intrusion detection systems. ...
ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers and editors for the constructive and insightful comments for improving the quality of this paper. ...
doi:10.1109/access.2019.2939011
fatcat:cndl7nxs4vcrdizvqyoimhkitu
A rewriting logic approach to the formal specification and verification of web applications
2014
Science of Computer Programming
our scripting language is powerful enough to model the dynamics of complex Web applications, where the interactions among Web servers and Web browsers are formalized through a landmark communicating protocol ...
This paper develops a Rewriting Logic framework for the automatic specification and verification of Web applications that considers the critical aspects of concurrent Web interactions, browser navigation ...
Acknowledgments We would like to thank María del Mar Gallardo for many useful comments and suggestions. ...
doi:10.1016/j.scico.2013.07.014
fatcat:7opzjjrfvvelfo7bjs7fq7ckwa
Automatic Vulnerability Checking of IEEE 802.16 WiMAX Protocols through TLA+
2006
2006 2nd IEEE Workshop on Secure Network Protocols
Formal methods are proposed for vulnerability analysis and most existing work focus on security properties such as perfect forwarding secrecy and correctness of authentication. ...
Vulnerability analysis is indispensably the first step towards securing a network protocol, but currently remains mostly a best effort manual process with no completeness guarantee. ...
For example, Lowe [2] used CSP and FDR, Shmatikov and Stern [3] used Murφ, and Corin et al. [4] used symbolic traces and PS-LTL. However, non-security network protocols are mostly ignored. ...
doi:10.1109/npsec.2006.320346
fatcat:akvfbhh7vbfgpm242fxuprmh5a
A Reduced Semantics for Deciding Trace Equivalence
[article]
2017
arXiv
pre-print
Many privacy-type properties of security protocols can be modelled using trace equivalence properties in suitable process algebras. ...
It has been shown that such properties can be decided for interesting classes of finite processes (i.e., without replication) by means of symbolic execution and constraint solving. ...
We would like to thank Vincent Cheval for interesting discussions and comments, especially on Section 6. ...
arXiv:1704.08540v4
fatcat:he2qcf4cznep3h2dmu2zbo3554
A formal framework to specify and verify real-time properties on critical systems
2014
International Journal of Critical Computer-Based Systems
We focus on properties commonly found during the analysis of reactive systems, expressed using real-time specification patterns. ...
We use observers in order to transform the verification of these timed patterns into the verification of simpler LTL formulas. ...
The first program is a graphical animator for Time Petri Net, while the latter is an interactive (text-based) animator for the full TTS model. Avionic Protocol and AADL. ...
doi:10.1504/ijccbs.2014.059593
fatcat:kaifli6ulbdmnibscw4u2hijfe
A Program Logic for Verifying Secure Routing Protocols
[chapter]
2014
Lecture Notes in Computer Science
In this paper, we develop a sound program logic for SANDLog-a declarative specification language for secure routing protocols-for verifying properties of these protocols. ...
As the number of models is infinite, model-checking-based tools, in general, cannot be used to prove the protocol secure. ...
We implement VCGen for automatically generating proof obligations and integrate VCGen into a compiler for SANDLog (Section 4). ...
doi:10.1007/978-3-662-43613-4_8
fatcat:vplnxqhqhrdwlg547ogjlvclka
An Approach to Securely Identifying Beneficial Collaboration in Decentralized Logistics Systems
2008
Manufacturing & Service Operations Management
We also show that it is incentive compatible for each company to correctly follow the protocol as well as provide their true data. ...
We present an algorithm that finds opportunities to swap loads without revealing any information except the loads swapped, along with proofs of the security of the protocol. ...
Acknowledgments The authors thank Reha Uzsoy for contributions made to the formulation of this problem in initial discussions of the work. ...
doi:10.1287/msom.1070.0167
fatcat:fbat6n2davgi3dzfhl36mwwdbe
Formal semantics of behavior specifications in the architecture analysis and design language standard
2016
2016 IEEE International High Level Design Validation and Test Workshop (HLDVT)
Such a repository enables automatic generation of analytical models for different aspects relevant to system design (timing, reliability, security, etc.). ...
Formal semantics of behavior specifications in the architecture analysis and design language standard. ...
The authors wish to thank Pierre Dissaux and the SAE sub-committee on the AADL for supporting this work with valuable comments on the model and method presented in this paper. ...
doi:10.1109/hldvt.2016.7748252
dblp:conf/hldvt/BesnardGGGTLB16
fatcat:cl2xk665zbhmbhoe7nh6evg2vy
HyperPCTL: A Temporal Logic for Probabilistic Hyperproperties
[article]
2018
arXiv
pre-print
A model checking algorithm for the proposed logic is also given for discrete-time Markov chains. ...
In this paper, we propose a new logic for expressing and reasoning about probabilistic hyperproperties. Hyperproperties characterize the relation between different independent executions of a system. ...
Acknowledgments We thank Boris Köpf for his valuable insights on expressing QIF policies. ...
arXiv:1804.01853v1
fatcat:qpj2jormfvfpnhucsfmvop2saq
« Previous
Showing results 1 — 15 out of 102 results