![]() ; Mauw, Sjouke ![]() in Fifth Annual IEEE Consumer Communications & Networking Conference 2008 (CCNC'08) (2008) Detailed reference viewed: 110 (1 UL)![]() ; ; et al in Information and Computation (2008), 206(2-4), 425-459 Detailed reference viewed: 99 (1 UL)![]() ; Mauw, Sjouke ![]() Book published by Springer (2008) Detailed reference viewed: 108 (0 UL)![]() ![]() Mauw, Sjouke ![]() in Science of Computer Programming (2008), 74(1-2), 164 Detailed reference viewed: 52 (1 UL)![]() Ceelen, Pieter ![]() ![]() ![]() in Electronic Notes in Theoretical Computer Science (2008), 197(2), 31-43 In the context of Dolev-Yao style analysis of security protocols, we consider the capability of an intruder to dynamically choose and assign names to agents. This capability has been overlooked in all ... [more ▼] In the context of Dolev-Yao style analysis of security protocols, we consider the capability of an intruder to dynamically choose and assign names to agents. This capability has been overlooked in all significant protocol verification frameworks based on formal methods. We identify and classify new type-flaw attacks arising from this capability. Several examples of protocols that are vulnerable to this type of attack are given, including Lowe’s modification of KSL. The consequences for automatic verification tools are discussed. [less ▲] Detailed reference viewed: 117 (0 UL)![]() van Deursen, Ton ![]() ![]() ![]() in Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks (2008) Detailed reference viewed: 104 (0 UL)![]() Mauw, Sjouke ![]() in Electronic Notes in Theoretical Computer Science (2007), 168 Detailed reference viewed: 137 (0 UL)![]() ; ; Mauw, Sjouke ![]() in Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops - Volume 01 (AINAW'07) (2007) Detailed reference viewed: 118 (0 UL)![]() ; Mauw, Sjouke ![]() in Theoretical Computer Science (2006), 367(1-2), 139-161 Detailed reference viewed: 135 (0 UL)![]() Mauw, Sjouke ![]() in Computer Networks & ISDN Systems (1999), 31(17), 1785-1799 Detailed reference viewed: 122 (3 UL)![]() ; ; et al in Distributed Computing (1996), 9(4), 157-171 Detailed reference viewed: 110 (0 UL)![]() Mauw, Sjouke ![]() in Fundamenta Informaticae (1990), XIII Detailed reference viewed: 82 (1 UL) |
||