AbstractWe report on work-in-progress on a new semantics for analyzing security protocols that combines complementary features of security logics and inductive methods. We use awareness to model the agents' resource-bounded reasoning and, in doing so, capture a more appropriate notion of belief than those usually considered in security logics. We also address the problem of modeling interleaved protocol executions, adapting ideas from inductive methods for protocol verification. The result is an intuitive, but expressive, doxastic logic for formalizing and reasoning about attacks. As a case study, we use awareness to characterize, and demonstrate the existence of, a man-in-the-middle attack upon the Needham-Schroeder Public Key protocol. Th...
We develop informal principals and formal rules to verify security properties in cryptographic proto...
We develop informal principals and formal rules to verify security properties in cryptographic proto...
Abstract Cryptographic protocols are usually specified in an informal, ad hoc language, with crucial...
We report on work-in-progress on a new semantics for analyzing security protocols that combines comp...
We report on work-in-progress on a new semantics for analyzing security protocols that combines comp...
AbstractWe propose a notion of information based abstraction for the logical study of security proto...
AbstractWe propose a notion of information based abstraction for the logical study of security proto...
As distributed computing becomes increasingly prevalent, driving a demand for security and privacy i...
As distributed computing becomes increasingly prevalent, driving a demand for security and privacy i...
Security protocols are widely used to ensure secure communications over insecure networks, such as t...
Security protocols are widely used to ensure secure communications over insecure networks, such as t...
Abstract. Logics for security protocol analysis require the formalization of an adversary model that...
Informal justifications of security protocols involve arguing backwards that various events are impo...
Abstract. Analysis methods for cryptographic protocols have often focused on information leakage rat...
Security protocols are communication protocols that are used when agents communicate sensitive infor...
We develop informal principals and formal rules to verify security properties in cryptographic proto...
We develop informal principals and formal rules to verify security properties in cryptographic proto...
Abstract Cryptographic protocols are usually specified in an informal, ad hoc language, with crucial...
We report on work-in-progress on a new semantics for analyzing security protocols that combines comp...
We report on work-in-progress on a new semantics for analyzing security protocols that combines comp...
AbstractWe propose a notion of information based abstraction for the logical study of security proto...
AbstractWe propose a notion of information based abstraction for the logical study of security proto...
As distributed computing becomes increasingly prevalent, driving a demand for security and privacy i...
As distributed computing becomes increasingly prevalent, driving a demand for security and privacy i...
Security protocols are widely used to ensure secure communications over insecure networks, such as t...
Security protocols are widely used to ensure secure communications over insecure networks, such as t...
Abstract. Logics for security protocol analysis require the formalization of an adversary model that...
Informal justifications of security protocols involve arguing backwards that various events are impo...
Abstract. Analysis methods for cryptographic protocols have often focused on information leakage rat...
Security protocols are communication protocols that are used when agents communicate sensitive infor...
We develop informal principals and formal rules to verify security properties in cryptographic proto...
We develop informal principals and formal rules to verify security properties in cryptographic proto...
Abstract Cryptographic protocols are usually specified in an informal, ad hoc language, with crucial...