Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Jolyon Clulow"'
Autor:
Tyler Moore, Jolyon Clulow
Publikováno v:
ACM SIGOPS Operating Systems Review. 40:18-21
We consider the problem of credential revocation in self-organizing systems. In the absence of a common trusted authority, reaching a decision is slow, expensive and prone to manipulation. We propose a radical, new strategy--- suicide for the common
Publikováno v:
Proceedings of the IEEE. 94:357-369
Tamper-resistant cryptographic processors are becoming the standard way to enforce data-usage policies. Their origins lie with military cipher machines and PIN processing in banking payment networks, expanding in the 1990s into embedded applications:
Autor:
Mike Bond, Jolyon Clulow
Publikováno v:
Information Security Technical Report. 11:93-99
The task of a security API is to allow users to process data and key material according to the designer's intentions, and to prevent any malicious sequence of commands from violating these intentions. Security APIs do this by attaching metadata to ke
Autor:
Jolyon Clulow, Mike Bond
Publikováno v:
Electronic Notes in Theoretical Computer Science. 125:13-24
We argue that formal analysis tools for security protocols are not achieving their full potential, and give only limited aid to designers of more complex modern protocols, protocols in constrained environments, and security APIs. We believe that typi
Publikováno v:
Security Protocols ISBN: 9783642177729
Security Protocols Workshop
Security Protocols Workshop
The automated and formal analysis of cryptographic primitives, security protocols and Application Programming Interfaces (APIs) up to date has been focused on discovering attacks that completely break the security of a system. However, there are atta
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5873f64a96e37a914e679c354f8f844b
https://doi.org/10.1007/978-3-642-17773-6_4
https://doi.org/10.1007/978-3-642-17773-6_4
Autor:
Jolyon Clulow
Publikováno v:
Security Protocols ISBN: 9783642177729
Security Protocols Workshop
Security Protocols Workshop
A wireless card would be more vulnerable to a relay attack than the traditional smartcard, and we spoke about relay attacks last year at SPW, and Steven Murdoch and Saar Dimar, at the Computer Lab, have just recently demonstrated it, if you’ve been
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9baae76b466922cdff105652ba62d220
https://doi.org/10.1007/978-3-642-17773-6_18
https://doi.org/10.1007/978-3-642-17773-6_18
Publikováno v:
Security Protocols ISBN: 9783642177729
Security Protocols Workshop
Security Protocols Workshop
We present new attacks against the EMV financial transaction security system (known in Europe as “Chip and PIN”), specifically on the back-end API support for sending secure messages to EMV smartcards.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bc33e9f86b5ff62900d66f2facdf0f3a
https://doi.org/10.1007/978-3-642-17773-6_17
https://doi.org/10.1007/978-3-642-17773-6_17
Autor:
Jonathan Herzog, Ronald L. Rivest, Ben Adida, Mike Bond, Amerson Lin, Jolyon Clulow, Paul Youn, Ross Anderson
Publikováno v:
Security Protocols ISBN: 9783642177729
So it’s a fairly provocative title, how did we get to that? Well automated tools have been successfully applied to modelling security protocols and finding attacks, and some good examples here are Gavin Lowe’s work, using FDR to model the Needham
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0bb2aa9bfd65f369266684bbd34e97a3
https://doi.org/10.1007/978-3-642-17773-6_21
https://doi.org/10.1007/978-3-642-17773-6_21
Autor:
Paul Youn, Amerson Lin, Jolyon Clulow, Ross Anderson, Mike Bond, Ben Adida, Ronald L. Rivest, Jonathan Herzog
Publikováno v:
Security Protocols ISBN: 9783642177729
So it’s a fairly provocative title, how did we get to that? Well automated tools have been successfully applied to modelling security protocols and finding attacks, and some good examples here are Gavin Lowe’s work, using FDR to model the Needham
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f14bf5b3249e965b22550c8eacf13ea1
https://doi.org/10.1007/978-3-642-17773-6_22
https://doi.org/10.1007/978-3-642-17773-6_22
Autor:
Ronald L. Rivest, Steven J. Murdoch, Jolyon Clulow, Ben Adida, Ross Anderson, Amerson Lin, Mike Bond
Publikováno v:
Security Protocols ISBN: 9783642049033
Security Protocols Workshop
Security Protocols Workshop
This paper surveys existing and new security issues affecting the EMV electronic payments protocol. We first introduce a new price/effort point for the cost of deploying eavesdropping and relay attacks --- a microcontroller-based interceptor costing
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d3f326975452bbf79a906aea028e3ec1
https://doi.org/10.1007/978-3-642-04904-0_7
https://doi.org/10.1007/978-3-642-04904-0_7