Breaking and fixing the Needham-Schroeder public-key protocol using FDR

G Lowe - International Workshop on Tools and Algorithms for the …, 1996 - Springer
In this paper we analyse the well known Needham-Schroeder Public-Key Protocol using
FDR, a refinement checker for CSP. We use FDR to discover an attack upon the protocol …

A hierarchy of authentication specifications

G Lowe - Proceedings 10th computer security foundations …, 1997 - ieeexplore.ieee.org
Many security protocols have the aim of authenticating one agent to another. Yet there is no
clear consensus in the academic literature about precisely what" authentication" means. We …

Mobile values, new names, and secure communication

M Abadi, C Fournet - ACM Sigplan Notices, 2001 - dl.acm.org
We study the interaction of the" new" construct with a rich but common form of (first-order)
communication. This interaction is crucial in security protocols, which are the main …

[PDF][PDF] A calculus for cryptographic protocols: The spi calculus

M Abadi, AD Gordon - Proceedings of the 4th ACM Conference on …, 1997 - dl.acm.org
We introduce the spi calculus, an extension of the pi calculus designed for the description
and analysis of cryptographic protocols. We show how to use the spi calculus, particularly for …

Architectural support for copy and tamper resistant software

D Lie, C Thekkath, M Mitchell, P Lincoln, D Boneh… - Acm Sigplan …, 2000 - dl.acm.org
Although there have been attempts to develop code transformations that yield tamper-
resistant software, no reliable software-only methods are known. This paper studies the …

[图书][B] Secure systems development with UML

J Jürjens - 2005 - books.google.com
Attacks against computer systems can cause considerable economic or physical damage.
High-quality development of security-critical systems is difficult, mainly because of the …

The applied pi calculus: Mobile values, new names, and secure communication

M Abadi, B Blanchet, C Fournet - Journal of the ACM (JACM), 2017 - dl.acm.org
We study the interaction of the programming construct “new,” which generates statically
scoped names, with communication via messages on channels. This interaction is crucial in …

Scyther: Semantics and verification of security protocols

CJF Cremers - 2006 - research.tue.nl
Recent technologies have cleared the way for large scale application of electronic
communication. The open and distributed nature of these communications implies that the …

[图书][B] The modelling and analysis of security protocols: the CSP approach

P Ryan, SA Schneider - 2001 - books.google.com
Security protocols are one of the most critical elements in enabling the secure
communication and processing of information, ensuring its confidentiality, integrity …

[引用][C] 安全协议20 年研究进展

卿斯汉 - 软件学报, 2003