Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Abraão Aires Urquiza"'
Autor:
Tajana Ban Kirigin, Abraão Aires Urquiza, Max I. Kanovich, Carolyn L. Talcott, Vivek Nigam, Andre Scedrov, Musab A. Alturki
Publikováno v:
Journal of Computer Security. 29:299-340
Protocol security verification is one of the best success stories of formal methods. However, some aspects important to protocol security, such as time and resources, are not covered by many formal models. While timing issues involve e.g., network de
Publikováno v:
Biblioteca Digital de Teses e Dissertações da UFPB
Universidade Federal da Paraíba (UFPB)
instacron:UFPB
Universidade Federal da Paraíba (UFPB)
instacron:UFPB
Attackers and malicious users have at their disposal several techniques to acquire sensitive information. Among them, timing attacks and traffic analysis generate a number of security breaches. The automated verification of this attacks is not as str
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______3056::82db1a0a0cdffb4ccf697d7e0ad38753
https://repositorio.ufpb.br/jspui/handle/123456789/20956
https://repositorio.ufpb.br/jspui/handle/123456789/20956
Autor:
Carolyn L. Talcott, Max I. Kanovich, Abraão Aires Urquiza, Vivek Nigam, Andre Scedrov, Musab A. Alturki, Tajana Ban Kirigin
Publikováno v:
CSF
Denial of Service (DoS) attacks have been a serious security concern, as no service is, in principle, protected against them. Although a Dolev-Yao intruder with unlimited resources can trivially render any service unavailable, DoS attacks do not nece
Publikováno v:
Foundations of Security, Protocols, and Equational Reasoning ISBN: 9783030190514
Foundations of Security, Protocols, and Equational Reasoning
Foundations of Security, Protocols, and Equational Reasoning
Intruders can infer properties of a system by measuring the time it takes for the system to respond to some request of a given protocol, that is, by exploiting time side channels. These properties may help intruders distinguish whether a system is a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::287481cb9adda4b881a4f3dbcf3199bb
https://doi.org/10.1007/978-3-030-19052-1_8
https://doi.org/10.1007/978-3-030-19052-1_8
Publikováno v:
Computer Security – ESORICS 2016 ISBN: 9783319457406
ESORICS (2)
ESORICS (2)
Timed Intruder Models have been proposed for the verification of Cyber-Physical Security Protocols (CPSP) amending the traditional Dolev-Yao intruder to obey the physical restrictions of the environment. Since to learn a message, a Timed Intruder nee
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bc62bff680a22e8ba4e92df193d8ecfe
https://doi.org/10.1007/978-3-319-45741-3_23
https://doi.org/10.1007/978-3-319-45741-3_23