70 Hits in 4.2 sec

Performance Evaluation of Security Protocols Specified in LySa

Chiara Bodei, Michele Curti, Pierpaolo Degano, Mikael Buchholtz, Flemming Nielson, Hanne Riis Nielson, Corrado Priami
2005 Electronical Notes in Theoretical Computer Science  
We then map transition systems to Markov chains and evaluate performance of systems, using standard tools.  ...  We use a special operational semantics which drives us in inferring quantitative measures on system describing cryptographic protocols. The transitions of the system carry enhanced labels.  ...  More generally, LySa provides us with a unifying framework, in which protocols can be specified and analysed [5] . Here, we show how we can compare and measure protocols, specified in LySa.  ... 
doi:10.1016/j.entcs.2004.01.017 fatcat:hu4z4tjc6vcmrahzafsyi5jdt4

Analysis of LYSA-calculus with explicit confidentiality annotations

Han Gao, H.R. Nielson
2006 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)  
A static analysis approach is developed for analyzing protocols specified in the extended LYSA.  ...  activities performed by attackers as specified by the confidentiality annotations.  ...  Extensions of the LYSA calculus enables the analysis to deal directly with some of the security properties.  ... 
doi:10.1109/aina.2006.100 dblp:conf/aina/GaoN06 fatcat:tkdrvrk5cjbpjbo45w4f4wnxfm

End-to-End Integrated Security and Performance Analysis on the DEGAS Choreographer Platform [chapter]

Mikael Buchholtz, Stephen Gilmore, Valentin Haenel, Carlo Montangero
2005 Lecture Notes in Computer Science  
We present a software tool platform which facilitates security and performance analysis of systems which starts and ends with UML model descriptions.  ...  We illustrate the approach with a well known protocol and report on the experience of industrial users who have applied Choreographer in their development work.  ...  The work reported here builds on a number of prior works by the members of the DEGAS project.  ... 
doi:10.1007/11526841_20 fatcat:jbclc5sssfgy5kcfg7kweazhai

Securing Statically-verified Communications Protocols Against Timing Attacks

Mikael Buchholtz, Stephen Gilmore, Jane Hillston, Flemming Nielson
2005 Electronical Notes in Theoretical Computer Science  
We present a federated analysis of communication protocols which considers both security properties and timing.  ...  derived information about the nature of the communication even in the presence of unbreakable encryption.  ...  The LySatool and the LySa extractor are available from  ... 
doi:10.1016/j.entcs.2005.01.016 fatcat:4ody4bemlja6zh4u6gdijdd4zm

Choreographing Security and Performance Analysis for Web Services [chapter]

Stephen Gilmore, Valentin Haenel, Leïla Kloul, Monika Maidl
2005 Lecture Notes in Computer Science  
Analysable content is extracted from the UML models in the form of process calculus descriptions. These are analysed to provide strong guarantees of satisfactory security and performance.  ...  The results are reflected back in the form of a modified version of the UML model which highlights points of the design which can give rise to operational difficulties.  ...  The work described in the present paper was undertaken while the authors were supported by the DEGAS (Design Environments for Global Applica-tionS) project IST-2001-32072 funded by the FET Proactive Initiative  ... 
doi:10.1007/11549970_15 fatcat:wk4b4xn7gzcblffychpxaksy7a

Analysing ZigBee Key Establishment Protocols [article]

Ender Yüksel
2012 arXiv   pre-print
In this report, we present our approach for protocol analysis together with a real example where we find an important flow in a contemporary wireless sensor network security protocol.  ...  We start by modelling protocols using a specific process algebraic formalism called LySa process calculus.  ...  Further details of specifying protocols in LySa are present in [8] .  ... 
arXiv:1205.6678v1 fatcat:3cm2574ywff3ngu3m6lrtc4o5q

Protocol Implementation Generator [chapter]

Jose Quaresma, Christian W. Probst
2012 Lecture Notes in Computer Science  
LySatool LySatool [17, 18] is a tool implemented in Standard ML that performs security analyses of protocols described in LySa using the Succinct Solver.  ...  security analysis -analyses the protocol for possible attacks; • Performance evaluation and reporting -provides some information regarding protocol performance; • Automatic code generation -safely generates  ...  Java The Java code regarding the send function can be seen in Figure C  ... 
doi:10.1007/978-3-642-27937-9_18 fatcat:inhe2fy56behnab7hctcxg6yye

Non-repudiation Analysis with LySa [chapter]

Mayla Brusò, Agostino Cortesi
2009 IFIP Advances in Information and Communication Technology  
This work introduces a formal analysis of the non-repudiation property for security protocols. Protocols are modelled in the process calculus LYSA, using an extended syntax with annotations.  ...  The result is an analysis that can statically check the protocols to predict if they are secure during their execution and which can be fully automated. *  ...  LYSA LYSA [2] is a process calculus in the π-calculus tradition that models security protocols on a global network.  ... 
doi:10.1007/978-3-642-01244-0_28 fatcat:d5vzjajhenbr3mh5bsfpwip3ye

Static Validation of a Voting Protocol

Christoffer Rosenkilde Nielsen, Esben Heltoft Andersen, Hanne Riis Nielson
2005 Electronical Notes in Theoretical Computer Science  
The protocol is formalised in an extension of the LYSA process calculus with blinding signatures.  ...  The desired security properties of electronic voting protocols include verifiability, accuracy, democracy and fairness.  ...  Modelling FOO92 in LYSA We are now ready to model the FOO92 protocol in LYSA .  ... 
doi:10.1016/j.entcs.2005.06.001 fatcat:iqgkt3n3fffvxh45nxcjbmmtam

Automated Analysis of Infinite Scenarios [chapter]

Mikael Buchholtz
2005 Lecture Notes in Computer Science  
The security of a network protocol crucially relies on the scenario in which the protocol is deployed.  ...  The tool is based on control flow analysis of the process calculus LySa and is applied to the Bauer, Berson, and Feiertag protocol where is reveals a previously undocumented problem, which occurs in some  ...  Many other ideas concerning LySa come from them as well as Chiara Bodei and Pierpaolo Degano.  ... 
doi:10.1007/11580850_18 fatcat:6avuljsa5vdjzldwhlcefjwone

Static validation of security protocols

Chiara Bodei, Mikael Buchholtz, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson
2005 Journal of Computer Security  
We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol.  ...  Finally, we demonstrate that these techniques suffice for identifying a number of authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom  ...  Assertions for origin and destination To describe in LySa the intentions of protocols, we decorate their text with labels, called crypto-points, and with assertions specifying the origin and destination  ... 
doi:10.3233/jcs-2005-13302 fatcat:clyyodohf5hyznyz45fun2ysga

On Evaluating the Performance of Security Protocols [chapter]

Chiara Bodei, Mikael Buchholtz, Michele Curti, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson, Corrado Priami
2005 Lecture Notes in Computer Science  
In comparing different versions of the same protocol or different protocols, specified in LySa, our technique can be suitably integrated with the Control Flow one, to check security at the same stage.  ...  More generally, LySa provides us with a unifying framework, in which security protocols can be specified and statically analysed [3, 5] through Control Flow Analysis.  ...  Performance costs, in terms of time overhead and resource consumption, must be carefully evaluated when choosing security mechanisms.  ... 
doi:10.1007/11535294_1 fatcat:ldbfi4eojna3hlpxvzmhsnoyju

The Guided System Development Framework: Modeling and Verifying Communication Systems [chapter]

Jose Quaresma, Christian W. Probst, Flemming Nielson
2014 Lecture Notes in Computer Science  
In a world that increasingly relies on the Internet to function, application developers rely on the implementations of protocols to guarantee the security of data transferred.  ...  The Guided System Development framework contributes to more secure communication systems by aiding the development of such systems.  ...  Acknowledgements We would like to thank Roberto Vigo, Sebastian Mödersheim (both from the Technical University of Denmark), and Kristin Y.  ... 
doi:10.1007/978-3-662-45231-8_42 fatcat:hv3usstvbzhuddbhzg774g3voi

CaPiTo: protocol stacks for services

Han Gao, Flemming Nielson, Hanne Riis Nielson
2011 Formal Aspects of Computing  
The abstract level focuses on the key functionality of the services; the plug-in level shows how to obtain security using standardised protocol stacks; finally, the concrete level allows to consider how  ...  We show how to formally analyse CaPiTo specifications for ensuring the absence of security flaws. The method used is based on static analysis of the corresponding LySa specifications.  ...  We should like to thank Chiara Bodei for working with us in the Sensoria project, Jose Nuno Carvalho Quaresma and the referees for providing useful comments on improving the presentation of the paper,  ... 
doi:10.1007/s00165-011-0174-7 fatcat:u4277g6zebd23bx6vkzoxvrptm

A Quantitative Study of Two Attacks

Chiara Bodei, Michele Curti, Pierpaolo Degano, Corrado Priami
2005 Electronical Notes in Theoretical Computer Science  
We detail the narration in the process algebra LySa [3], that makes it possible to specify the behaviour of both the legitimate participants and of the attacker in terms of processes running in parallel  ...  In [4], we proposed a first step towards the development of a single, formal design methodology that supports designers in analysing the performance of protocols, in terms of time overhead and resource  ...  Acknowledgement We are deeply indebted with Francesco Romani for his patient guide in the matrix world.  ... 
doi:10.1016/j.entcs.2004.10.008 fatcat:ago47jh6fndnhmypmzzrhtjh6a
« Previous Showing results 1 — 15 out of 70 results