Abstract. We propose a framework for timing attacks, based on (a variant of) the applied-pi calculus. Since many privacy properties, as well as strong secrecy and game-based security properties, are stated as process equivalences, we focus on (time) trace equivalence. We show that actually, considering timing attacks does not add any complexity: time trace equivalence can be reduced to length trace equivalence, where the attacker no longer has access to execution times but can still compare the length of messages. We therefore deduce from a previous decidability result for length equivalence that time trace equivalence is decidable for bounded processes and the standard cryptographic primitives. As an application, we study several protocols...
AbstractWe present a federated analysis of communication protocols which considers both security pro...
A real-time process algebra, enhanced with specific constructs for handling cryptographic primitives...
In this paper we study the protocol insecurity problem for time-dependent security protocols under t...
International audienceWe propose a framework for timing attacks, based on (a variant of) the applied...
Abstract. We propose a framework for timing attacks, based on (a variant of) the applied-pi calculus...
Nowadays, protocols often use time to provide better security. For instance, critical credentials ar...
We propose a method for engineering security protocols that are aware of timing aspects. We study a ...
We propose a method for engineering security protocols that are aware of timing aspects. We study a ...
We propose a method for engineering security protocols that are aware of timing aspects. We study a ...
Abstract. A formal model for description of passive and active timing attacks is presented, studied ...
International audienceSecurity protocols have been successfully analyzed using symbolic models, wher...
When the running time of a cryptographic algorithm is non-constant, timing measurements can leak inf...
We propose a method for engineering security protocols that are aware of timing aspects. We study a ...
Abstract. In this paper we offer a methodology for verifying correctness of (timed) security protoco...
AbstractWe present a symbolic decision procedure for time-sensitive cryptographic protocols. We cons...
AbstractWe present a federated analysis of communication protocols which considers both security pro...
A real-time process algebra, enhanced with specific constructs for handling cryptographic primitives...
In this paper we study the protocol insecurity problem for time-dependent security protocols under t...
International audienceWe propose a framework for timing attacks, based on (a variant of) the applied...
Abstract. We propose a framework for timing attacks, based on (a variant of) the applied-pi calculus...
Nowadays, protocols often use time to provide better security. For instance, critical credentials ar...
We propose a method for engineering security protocols that are aware of timing aspects. We study a ...
We propose a method for engineering security protocols that are aware of timing aspects. We study a ...
We propose a method for engineering security protocols that are aware of timing aspects. We study a ...
Abstract. A formal model for description of passive and active timing attacks is presented, studied ...
International audienceSecurity protocols have been successfully analyzed using symbolic models, wher...
When the running time of a cryptographic algorithm is non-constant, timing measurements can leak inf...
We propose a method for engineering security protocols that are aware of timing aspects. We study a ...
Abstract. In this paper we offer a methodology for verifying correctness of (timed) security protoco...
AbstractWe present a symbolic decision procedure for time-sensitive cryptographic protocols. We cons...
AbstractWe present a federated analysis of communication protocols which considers both security pro...
A real-time process algebra, enhanced with specific constructs for handling cryptographic primitives...
In this paper we study the protocol insecurity problem for time-dependent security protocols under t...