Matches in SemOpenAlex for { <https://semopenalex.org/work/W2019979200> ?p ?o ?g. }
Showing items 1 to 96 of
96
with 100 items per page.
- W2019979200 endingPage "130" @default.
- W2019979200 startingPage "117" @default.
- W2019979200 abstract "The verification of security protocols has attracted a lot of interest in the formal methods community, yielding two main verification approaches: i) state exploration, e.g. FDR [Gavin Lowe. Breaking and fixing the needham-schroeder public-key protocol using FDR. In TACAs'96: Proceedings of the Second International Workshop on Tools and Algorithms for Construction and Analysis of Systems, pages 147–166, London, UK, 1996. Springer-Verlag] and OFMC [A.D. Basin, S. Mödersheim, and L. Viganò. An on-the-fly model-checker for security protocol analysis. In D. Gollmann and E. Snekkenes, editors, ESORICS'03: 8th European Symposium on Research in Computer Security, number 2808 in Lecture Notes in Computer Science, pages 253–270, Gjøvik, Norway, 2003. Springer-Verlag]; and ii) theorem proving, e.g. the Isabelle inductive method [Lawrence C. Paulson. The inductive approach to verifying cryptographic protocols. Journal in Computer Security, 6(1-2):85–128, 1998] and Coral [G. Steel, A. Bundy, and M. Maidl. Attacking the asokan-ginzboorg protocol for key distribution in an ad-hoc bluetooth network using coral. In H. König, M. Heiner, and A. Wolisz, editors, IFIP TC6 /WG 6.1: Proceedings of 23rd IFIP International Conference on Formal Techniques for Networked and Distributed Systems, volume 2767, pages 1–10, Berlin, Germany, 2003. FORTE 2003 (work in progress papers)]. Complementing formal methods, Abadi and Needham's principles aim to guide the design of security protocols in order to make them simple and, hopefully, correct [M. Abadi and R. Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1):6–15, 1996]. We are interested in a problem related to verification but far less explored: the correction of faulty security protocols. Experience has shown that the analysis of counterexamples or failed proof attempts often holds the key to the completion of proofs and for the correction of a faulty model. In this paper, we introduce a method for patching faulty security protocols that are susceptible to an interleaving-replay attack. Our method makes use of Abadi and Needham's principles for the prudent engineering practice for cryptographic protocols in order to guide the location of the fault in a protocol as well as the proposition of candidate patches. We have run a test on our method with encouraging results. The test set includes 21 faulty security protocols borrowed from the Clark-Jacob library [J. Clark and J. Jacob. A survey of authentication protocol literature: Version 1.0. Technical report, Department of Computer Science, University of York, November 1997. A complete specification of the Clark-Jacob library in CAPSL is available at http://www.cs.sri.com/millen/capsl/]." @default.
- W2019979200 created "2016-06-24" @default.
- W2019979200 creator A5019184468 @default.
- W2019979200 creator A5040205337 @default.
- W2019979200 creator A5045469910 @default.
- W2019979200 date "2007-05-01" @default.
- W2019979200 modified "2023-10-18" @default.
- W2019979200 title "A Method for Patching Interleaving-Replay Attacks in Faulty Security Protocols" @default.
- W2019979200 cites W119246384 @default.
- W2019979200 cites W1491035119 @default.
- W2019979200 cites W1596447773 @default.
- W2019979200 cites W1944323241 @default.
- W2019979200 cites W1955248941 @default.
- W2019979200 cites W2029693536 @default.
- W2019979200 cites W2097913369 @default.
- W2019979200 cites W2117767383 @default.
- W2019979200 cites W2120600989 @default.
- W2019979200 cites W2120926795 @default.
- W2019979200 cites W2132544882 @default.
- W2019979200 cites W2145415641 @default.
- W2019979200 cites W2154568476 @default.
- W2019979200 cites W2155032609 @default.
- W2019979200 cites W2169908972 @default.
- W2019979200 cites W3162919972 @default.
- W2019979200 cites W166463596 @default.
- W2019979200 doi "https://doi.org/10.1016/j.entcs.2006.12.034" @default.
- W2019979200 hasPublicationYear "2007" @default.
- W2019979200 type Work @default.
- W2019979200 sameAs 2019979200 @default.
- W2019979200 citedByCount "10" @default.
- W2019979200 countsByYear W20199792002012 @default.
- W2019979200 countsByYear W20199792002014 @default.
- W2019979200 countsByYear W20199792002015 @default.
- W2019979200 countsByYear W20199792002017 @default.
- W2019979200 crossrefType "journal-article" @default.
- W2019979200 hasAuthorship W2019979200A5019184468 @default.
- W2019979200 hasAuthorship W2019979200A5040205337 @default.
- W2019979200 hasAuthorship W2019979200A5045469910 @default.
- W2019979200 hasBestOaLocation W20199792001 @default.
- W2019979200 hasConcept C110251889 @default.
- W2019979200 hasConcept C111498074 @default.
- W2019979200 hasConcept C115903868 @default.
- W2019979200 hasConcept C142724271 @default.
- W2019979200 hasConcept C148730421 @default.
- W2019979200 hasConcept C15927051 @default.
- W2019979200 hasConcept C178489894 @default.
- W2019979200 hasConcept C203062551 @default.
- W2019979200 hasConcept C204787440 @default.
- W2019979200 hasConcept C2780385302 @default.
- W2019979200 hasConcept C33884865 @default.
- W2019979200 hasConcept C38369872 @default.
- W2019979200 hasConcept C38652104 @default.
- W2019979200 hasConcept C41008148 @default.
- W2019979200 hasConcept C71924100 @default.
- W2019979200 hasConcept C75606506 @default.
- W2019979200 hasConcept C80444323 @default.
- W2019979200 hasConcept C99674996 @default.
- W2019979200 hasConceptScore W2019979200C110251889 @default.
- W2019979200 hasConceptScore W2019979200C111498074 @default.
- W2019979200 hasConceptScore W2019979200C115903868 @default.
- W2019979200 hasConceptScore W2019979200C142724271 @default.
- W2019979200 hasConceptScore W2019979200C148730421 @default.
- W2019979200 hasConceptScore W2019979200C15927051 @default.
- W2019979200 hasConceptScore W2019979200C178489894 @default.
- W2019979200 hasConceptScore W2019979200C203062551 @default.
- W2019979200 hasConceptScore W2019979200C204787440 @default.
- W2019979200 hasConceptScore W2019979200C2780385302 @default.
- W2019979200 hasConceptScore W2019979200C33884865 @default.
- W2019979200 hasConceptScore W2019979200C38369872 @default.
- W2019979200 hasConceptScore W2019979200C38652104 @default.
- W2019979200 hasConceptScore W2019979200C41008148 @default.
- W2019979200 hasConceptScore W2019979200C71924100 @default.
- W2019979200 hasConceptScore W2019979200C75606506 @default.
- W2019979200 hasConceptScore W2019979200C80444323 @default.
- W2019979200 hasConceptScore W2019979200C99674996 @default.
- W2019979200 hasIssue "4" @default.
- W2019979200 hasLocation W20199792001 @default.
- W2019979200 hasOpenAccess W2019979200 @default.
- W2019979200 hasPrimaryLocation W20199792001 @default.
- W2019979200 hasRelatedWork W1488906949 @default.
- W2019979200 hasRelatedWork W1579989646 @default.
- W2019979200 hasRelatedWork W1985050790 @default.
- W2019979200 hasRelatedWork W2019979200 @default.
- W2019979200 hasRelatedWork W2051873194 @default.
- W2019979200 hasRelatedWork W2069049086 @default.
- W2019979200 hasRelatedWork W2374301032 @default.
- W2019979200 hasRelatedWork W2374503107 @default.
- W2019979200 hasRelatedWork W2576158814 @default.
- W2019979200 hasRelatedWork W4280568695 @default.
- W2019979200 hasVolume "174" @default.
- W2019979200 isParatext "false" @default.
- W2019979200 isRetracted "false" @default.
- W2019979200 magId "2019979200" @default.
- W2019979200 workType "article" @default.