A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Performance Evaluation of Security Protocols Specified in LySa
2005
Electronical Notes in Theoretical Computer Science
We then map transition systems to Markov chains and evaluate performance of systems, using standard tools. ...
We use a special operational semantics which drives us in inferring quantitative measures on system describing cryptographic protocols. The transitions of the system carry enhanced labels. ...
More generally, LySa provides us with a unifying framework, in which protocols can be specified and analysed [5] . Here, we show how we can compare and measure protocols, specified in LySa. ...
doi:10.1016/j.entcs.2004.01.017
fatcat:hu4z4tjc6vcmrahzafsyi5jdt4
Analysis of LYSA-calculus with explicit confidentiality annotations
2006
20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)
A static analysis approach is developed for analyzing protocols specified in the extended LYSA. ...
activities performed by attackers as specified by the confidentiality annotations. ...
Extensions of the LYSA calculus enables the analysis to deal directly with some of the security properties. ...
doi:10.1109/aina.2006.100
dblp:conf/aina/GaoN06
fatcat:tkdrvrk5cjbpjbo45w4f4wnxfm
End-to-End Integrated Security and Performance Analysis on the DEGAS Choreographer Platform
[chapter]
2005
Lecture Notes in Computer Science
We present a software tool platform which facilitates security and performance analysis of systems which starts and ends with UML model descriptions. ...
We illustrate the approach with a well known protocol and report on the experience of industrial users who have applied Choreographer in their development work. ...
The work reported here builds on a number of prior works by the members of the DEGAS project. ...
doi:10.1007/11526841_20
fatcat:jbclc5sssfgy5kcfg7kweazhai
Securing Statically-verified Communications Protocols Against Timing Attacks
2005
Electronical Notes in Theoretical Computer Science
We present a federated analysis of communication protocols which considers both security properties and timing. ...
derived information about the nature of the communication even in the presence of unbreakable encryption. ...
The LySatool and the LySa extractor are available from http://www.imm.dtu.dk/cs_LySa/. ...
doi:10.1016/j.entcs.2005.01.016
fatcat:4ody4bemlja6zh4u6gdijdd4zm
Choreographing Security and Performance Analysis for Web Services
[chapter]
2005
Lecture Notes in Computer Science
Analysable content is extracted from the UML models in the form of process calculus descriptions. These are analysed to provide strong guarantees of satisfactory security and performance. ...
The results are reflected back in the form of a modified version of the UML model which highlights points of the design which can give rise to operational difficulties. ...
The work described in the present paper was undertaken while the authors were supported by the DEGAS (Design Environments for Global Applica-tionS) project IST-2001-32072 funded by the FET Proactive Initiative ...
doi:10.1007/11549970_15
fatcat:wk4b4xn7gzcblffychpxaksy7a
Analysing ZigBee Key Establishment Protocols
[article]
2012
arXiv
pre-print
In this report, we present our approach for protocol analysis together with a real example where we find an important flow in a contemporary wireless sensor network security protocol. ...
We start by modelling protocols using a specific process algebraic formalism called LySa process calculus. ...
Further details of specifying protocols in LySa are present in [8] . ...
arXiv:1205.6678v1
fatcat:3cm2574ywff3ngu3m6lrtc4o5q
Protocol Implementation Generator
[chapter]
2012
Lecture Notes in Computer Science
LySatool LySatool [17, 18] is a tool implemented in Standard ML that performs security analyses of protocols described in LySa using the Succinct Solver. ...
security analysis -analyses the protocol for possible attacks; • Performance evaluation and reporting -provides some information regarding protocol performance; • Automatic code generation -safely generates ...
Java The Java code regarding the send function can be seen in Figure C ...
doi:10.1007/978-3-642-27937-9_18
fatcat:inhe2fy56behnab7hctcxg6yye
Non-repudiation Analysis with LySa
[chapter]
2009
IFIP Advances in Information and Communication Technology
This work introduces a formal analysis of the non-repudiation property for security protocols. Protocols are modelled in the process calculus LYSA, using an extended syntax with annotations. ...
The result is an analysis that can statically check the protocols to predict if they are secure during their execution and which can be fully automated. * ...
LYSA LYSA [2] is a process calculus in the π-calculus tradition that models security protocols on a global network. ...
doi:10.1007/978-3-642-01244-0_28
fatcat:d5vzjajhenbr3mh5bsfpwip3ye
Static Validation of a Voting Protocol
2005
Electronical Notes in Theoretical Computer Science
The protocol is formalised in an extension of the LYSA process calculus with blinding signatures. ...
The desired security properties of electronic voting protocols include verifiability, accuracy, democracy and fairness. ...
Modelling FOO92 in LYSA We are now ready to model the FOO92 protocol in LYSA . ...
doi:10.1016/j.entcs.2005.06.001
fatcat:iqgkt3n3fffvxh45nxcjbmmtam
Automated Analysis of Infinite Scenarios
[chapter]
2005
Lecture Notes in Computer Science
The security of a network protocol crucially relies on the scenario in which the protocol is deployed. ...
The tool is based on control flow analysis of the process calculus LySa and is applied to the Bauer, Berson, and Feiertag protocol where is reveals a previously undocumented problem, which occurs in some ...
Many other ideas concerning LySa come from them as well as Chiara Bodei and Pierpaolo Degano. ...
doi:10.1007/11580850_18
fatcat:6avuljsa5vdjzldwhlcefjwone
Static validation of security protocols
2005
Journal of Computer Security
We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. ...
Finally, we demonstrate that these techniques suffice for identifying a number of authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom ...
Assertions for origin and destination To describe in LySa the intentions of protocols, we decorate their text with labels, called crypto-points, and with assertions specifying the origin and destination ...
doi:10.3233/jcs-2005-13302
fatcat:clyyodohf5hyznyz45fun2ysga
On Evaluating the Performance of Security Protocols
[chapter]
2005
Lecture Notes in Computer Science
In comparing different versions of the same protocol or different protocols, specified in LySa, our technique can be suitably integrated with the Control Flow one, to check security at the same stage. ...
More generally, LySa provides us with a unifying framework, in which security protocols can be specified and statically analysed [3, 5] through Control Flow Analysis. ...
Performance costs, in terms of time overhead and resource consumption, must be carefully evaluated when choosing security mechanisms. ...
doi:10.1007/11535294_1
fatcat:ldbfi4eojna3hlpxvzmhsnoyju
The Guided System Development Framework: Modeling and Verifying Communication Systems
[chapter]
2014
Lecture Notes in Computer Science
In a world that increasingly relies on the Internet to function, application developers rely on the implementations of protocols to guarantee the security of data transferred. ...
The Guided System Development framework contributes to more secure communication systems by aiding the development of such systems. ...
Acknowledgements We would like to thank Roberto Vigo, Sebastian Mödersheim (both from the Technical University of Denmark), and Kristin Y. ...
doi:10.1007/978-3-662-45231-8_42
fatcat:hv3usstvbzhuddbhzg774g3voi
CaPiTo: protocol stacks for services
2011
Formal Aspects of Computing
The abstract level focuses on the key functionality of the services; the plug-in level shows how to obtain security using standardised protocol stacks; finally, the concrete level allows to consider how ...
We show how to formally analyse CaPiTo specifications for ensuring the absence of security flaws. The method used is based on static analysis of the corresponding LySa specifications. ...
We should like to thank Chiara Bodei for working with us in the Sensoria project, Jose Nuno Carvalho Quaresma and the referees for providing useful comments on improving the presentation of the paper, ...
doi:10.1007/s00165-011-0174-7
fatcat:u4277g6zebd23bx6vkzoxvrptm
A Quantitative Study of Two Attacks
2005
Electronical Notes in Theoretical Computer Science
We detail the narration in the process algebra LySa [3], that makes it possible to specify the behaviour of both the legitimate participants and of the attacker in terms of processes running in parallel ...
In [4], we proposed a first step towards the development of a single, formal design methodology that supports designers in analysing the performance of protocols, in terms of time overhead and resource ...
Acknowledgement We are deeply indebted with Francesco Romani for his patient guide in the matrix world. ...
doi:10.1016/j.entcs.2004.10.008
fatcat:ago47jh6fndnhmypmzzrhtjh6a
« Previous
Showing results 1 — 15 out of 70 results