Component-based formal analysis of 5G-AKA: Channel assumptions and session confusion

C Cremers, M Dehnel-Wild - Network and Distributed System Security …, 2019 - ora.ox.ac.uk
The 5G mobile telephony standards are nearing completion; upon adoption these will be
used by billions across the globe. Ensuring the security of 5G communication is of the utmost …

{SAPIC+}: protocol verifiers of the world, unite!

V Cheval, C Jacomme, S Kremer… - 31st USENIX Security …, 2022 - usenix.org
Symbolic security protocol verifiers have reached a high degree of automation and maturity.
Today, experts can model real-world protocols, but this often requires model-specific …

An extensive formal analysis of multi-factor authentication protocols

C Jacomme, S Kremer - ACM Transactions on Privacy and Security …, 2021 - dl.acm.org
Passwords are still the most widespread means for authenticating users, even though they
have been shown to create huge security problems. This motivated the use of additional …

A comprehensive formal analysis of 5G handover

A Peltonen, R Sasse, D Basin - … of the 14th ACM Conference on Security …, 2021 - dl.acm.org
5G has been under standardization for over a decade and will drive the world's mobile
technologies in the decades to come. One of the cornerstones of the 5G standard is its …

Formal Analysis and Patching of {BLE-SC} Pairing

M Shi, J Chen, K He, H Zhao, M Jia, R Du - 32nd USENIX Security …, 2023 - usenix.org
Bluetooth Low Energy (BLE) is the mainstream Bluetooth standard and BLE Secure
Connections (BLC-SC) pairing is a protocol that authenticates two Bluetooth devices and …

Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector

M Evans, Y He, L Maglaras, I Yevseyeva… - International journal of …, 2019 - Elsevier
Background The number of reported public sector information security incidents has
significantly increased recently including 22% related to the UK health sector. Over two …

Robustification of behavioral designs against environmental deviations

C Zhang, T Saluja, R Meira-Góes… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Modern software systems are deployed in a highly dynamic, uncertain environment. Ideally,
a system that is robust should be capable of establishing its most critical requirements even …

Formal analysis of 5G authentication and key management for applications (AKMA)

T Yang, S Wang, B Zhan, N Zhan, J Li, S Xiang… - Journal of Systems …, 2022 - Elsevier
Security and privacy of users' information in mobile communication networks have drawn
increasing attention. The development of 5G system has demanded new protocols to realize …

Modelling human threats in security ceremonies

G Bella, R Giustolisi… - Journal of Computer …, 2022 - content.iospress.com
Abstract Socio-Technical Systems (STSs) combine the operations of technical systems with
the choices and intervention of humans, namely the users of the technical systems …

Alethea: A provably secure random sample voting protocol

D Basin, S Radomirovic… - 2018 IEEE 31st Computer …, 2018 - ieeexplore.ieee.org
In random sample voting, only a randomly chosen subset of all eligible voters are selected to
vote. This poses new security challenges for the voting protocol used. In particular, one must …