A security ceremony expands a security protocol with everything that is considered out of band for it. Notably, it incorporates the user, who, according to their belief systems and cultural values, may be variously targeted by social engineering attacks. This makes ceremonies complex and varied, hence the need for their formal analysis aimed at their rigorous understanding. Formal analysis in turn requires clarifying the ceremony structure to build a ceremony model. The model defined here spans over a number of socio-technical layers, ranging from a computer network to society. It inspires a layered analysis of security ceremonies, that is layer by layer. This paper focuses on the human-computer interaction layer, which features a socio-tec...
“Beautiful Security” is a paradigm that requires security ceremonies to contribute to the ‘beauty’ o...
We propose a formal model to analyze security protocols with human interaction. We model humans with...
This is joint work between myself and my co-author, Vivien Rooney. I’m a computer scientist, and Viv...
Part 7: Social Networks and Social EngineeringInternational audienceA security ceremony expands a se...
The concept of the security ceremony was introduced a few years ago to complement the concept of the...
Abstract. The concept of ceremony is introduced as an extension of the concept of network protocol, ...
The concept of the security ceremony was introduced a few years ago to complement the concept of the...
Abstract. We are interested in formal modelling and verification of se-curity ceremonies. Considerab...
Phishing takes advantage of the way humans interact with computers or interpret messages. A security...
Part 4: VerificationInternational audienceSecurity ceremonies extend cryptographic protocols with mo...
Since Needham and Schroeder introduced the idea of an ac-tive attacker, a lot of research has been m...
When we use secure computer systems, we engage with carefully orchestrated and ordered interactions ...
Attacks on systems and organisations increasingly exploit human actors, for example through social e...
Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro Tecnológico, Programa de Pós...
International audienceSecurity protocols are the small distributed programs which are omnipresent in...
“Beautiful Security” is a paradigm that requires security ceremonies to contribute to the ‘beauty’ o...
We propose a formal model to analyze security protocols with human interaction. We model humans with...
This is joint work between myself and my co-author, Vivien Rooney. I’m a computer scientist, and Viv...
Part 7: Social Networks and Social EngineeringInternational audienceA security ceremony expands a se...
The concept of the security ceremony was introduced a few years ago to complement the concept of the...
Abstract. The concept of ceremony is introduced as an extension of the concept of network protocol, ...
The concept of the security ceremony was introduced a few years ago to complement the concept of the...
Abstract. We are interested in formal modelling and verification of se-curity ceremonies. Considerab...
Phishing takes advantage of the way humans interact with computers or interpret messages. A security...
Part 4: VerificationInternational audienceSecurity ceremonies extend cryptographic protocols with mo...
Since Needham and Schroeder introduced the idea of an ac-tive attacker, a lot of research has been m...
When we use secure computer systems, we engage with carefully orchestrated and ordered interactions ...
Attacks on systems and organisations increasingly exploit human actors, for example through social e...
Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro Tecnológico, Programa de Pós...
International audienceSecurity protocols are the small distributed programs which are omnipresent in...
“Beautiful Security” is a paradigm that requires security ceremonies to contribute to the ‘beauty’ o...
We propose a formal model to analyze security protocols with human interaction. We model humans with...
This is joint work between myself and my co-author, Vivien Rooney. I’m a computer scientist, and Viv...