![]() Horne, Ross James ![]() ![]() in In 35th Annual ACM⁄IEEE Symposium on Logic in Computer Science (LICS ’20), July 8–11, 2020, Saarbrücken, Germany. ACM (2020) Detailed reference viewed: 108 (0 UL)![]() Horne, Ross James ![]() in In 31st International Conference on Concurrency Theory (CONCUR 2020). (2020) Detailed reference viewed: 37 (2 UL)![]() Gabbay, Dov M. ![]() ![]() ![]() in Graphical Models for Security - 7th International Workshop (2020) Detailed reference viewed: 5 (0 UL)![]() Horne, Ross James ![]() ![]() ![]() in Breaking Unlinkability of the ICAO 9303 Standard for e-Passports using Bisimilarity (2019, September 23) We clear up confusion surrounding privacy claims about the ICAO 9303 standard for e-passports. The ICAO 9303 standard includes a Basic Access Control (BAC) protocol that should protect the user from being ... [more ▼] We clear up confusion surrounding privacy claims about the ICAO 9303 standard for e-passports. The ICAO 9303 standard includes a Basic Access Control (BAC) protocol that should protect the user from being traced from one session to another. While it is well known that there are attacks on BAC, allowing an attacker to link multiple uses of the same passport, due to differences in implementation; there still remains confusion about whether there is an attack on unlinkability directly on the BAC protocol as specified in the ICAO 9303 standard. This paper clarifies the nature of the debate, and sources of potential confusion. We demonstrate that the original privacy claims made are flawed, by uncovering attacks on a strong formulation of unlinkability. We explain why the use of the bisimilarity equivalence technique is essential for uncovering our attacks. We also clarify what assumptions lead to proofs of formulations of unlinkability using weaker notions of equivalence. Furthermore, we propose a fix for BAC within the scope of the standard, and prove that it is correct, again using a state-of-the-art approach to bisimilarity. [less ▲] Detailed reference viewed: 51 (2 UL)![]() ; Horne, Ross James ![]() Scientific Conference (2019) Detailed reference viewed: 30 (0 UL)![]() ; ; et al in Theoretical Computer Science (2019) This paper investigates a new form of delegation for multiparty session calculi. Usually, delegation allows a session participant to appoint a participant in another session to act on her behalf. This ... [more ▼] This paper investigates a new form of delegation for multiparty session calculi. Usually, delegation allows a session participant to appoint a participant in another session to act on her behalf. This means that delegation is inherently an inter-session mechanism, which requires session interleaving. Hence delegation falls outside the descriptive power of global types, which specify single sessions. As a consequence, properties such as deadlock-freedom or lock-freedom are difficult to ensure in the presence of delegation. Here we adopt a different view of delegation, by allowing participants to delegate tasks to each other within the same multiparty session. This way, delegation occurs within a single session (internal delegation) and may be captured by its global type. To increase flexibility in the use of delegation, our calculus uses connecting communications, which allow optional participants in the branches of choices. By these means, we are able to express conditional delegation. We present a session type system based on global types with internal delegation, and show that it ensures the usual safety properties of multiparty sessions, together with a progress property. [less ▲] Detailed reference viewed: 17 (1 UL)![]() Horne, Ross James ![]() in ACM Transactions on Computational Logic (2019), 20(4), 221--2244 Detailed reference viewed: 29 (2 UL)![]() Horne, Ross James ![]() in Mathematical Structures in Computer Science (2019) Detailed reference viewed: 70 (0 UL)![]() Horne, Ross James ![]() in 4th International Conference on Formal Structures for Computation and Deduction (FSCD 2019). (2019) Detailed reference viewed: 10 (0 UL)![]() Horne, Ross James ![]() in Proceedings of LICS '18: 33rd Annual ACM/IEEE Symposium on Logic in Computer Science, Oxford, United Kingdom, July 9-12, 2018 (LICS '18) (2018) Quasi-open bisimilarity is the coarsest notion of bisimilarity for the π-calculus that is also a congruence. This work extends quasi-open bisimilarity to handle mismatch (guards with inequalities). This ... [more ▼] Quasi-open bisimilarity is the coarsest notion of bisimilarity for the π-calculus that is also a congruence. This work extends quasi-open bisimilarity to handle mismatch (guards with inequalities). This minimal extension of quasi-open bisimilarity allows fresh names to be manufactured to provide constructive evidence that an inequality holds. The extension of quasi-open bisimilarity is canonical and robust --- coinciding with open barbed bisimilarity (an objective notion of bisimilarity congruence) and characterised by an intuitionistic variant of an established modal logic. The more famous open bisimilarity is also considered, for which the coarsest extension for handling mismatch is identified. Applications to checking privacy properties are highlighted. Examples and soundness results are mechanised using the proof assistant Abella. [less ▲] Detailed reference viewed: 71 (1 UL)![]() Horne, Ross James ![]() ![]() in Proc.\ 5th International Workshop on Graphical Models for Security (GraMSec'18) (2018) Detailed reference viewed: 95 (10 UL)![]() Horne, Ross James ![]() ![]() in Fundamenta Informaticae (2017), 153(1-2), 57-86 Attack trees profile the sub-goals of the proponent of an attack. Attack trees have a variety of semantics depending on the kind of question posed about the attack, where questions are captured by an ... [more ▼] Attack trees profile the sub-goals of the proponent of an attack. Attack trees have a variety of semantics depending on the kind of question posed about the attack, where questions are captured by an attribute domain. We observe that one of the most general semantics for attack trees, the multiset semantics, coincides with a semantics expressed using linear logic propositions. The semantics can be used to compare attack trees to determine whether one attack tree is a specialisation of another attack tree. Building on these observations, we propose two new semantics for an extension of attack trees named causal attack trees. Such attack trees are extended with an operator capturing the causal order of sub-goals in an attack. These two semantics extend the multiset semantics to sets of series-parallel graphs closed under certain graph homomorphisms, where each semantics respects a class of attribute domains. We define a sound logical system with respect to each of these semantics, by using a recently introduced extension of linear logic, called MAV , featuring a non-commutative operator. The non-commutative operator models causal dependencies in causal attack trees. Similarly to linear logic for attack trees, implication defines a decidable preorder for specialising causal attack trees that soundly respects a class of attribute domains. [less ▲] Detailed reference viewed: 192 (4 UL)![]() ; Horne, Ross James ![]() in 28th International Conference on Concurrency Theory (CONCUR 2017). (2017) Detailed reference viewed: 24 (0 UL)![]() Horne, Ross James ![]() in 27th International Conference on Concurrency Theory (CONCUR 2016) (2016) Detailed reference viewed: 18 (0 UL)![]() ; Horne, Ross James ![]() in Journal of Logical and Algebraic Methods in Programming (2016), 85(5), 681-706 Detailed reference viewed: 64 (0 UL)![]() ; ; Horne, Ross James ![]() in Programming Languages and Systems - 14th Asian Symposium, APLAS 2016, Hanoi, Vietnam, November 21-23, 2016, Proceedings (2016) Detailed reference viewed: 65 (0 UL)![]() ; Horne, Ross James ![]() in In Perspectives of System Informatics, 10th International Andrei Ershov Informatics Conference, PSI 2015, in Memory of Helmut Veith, Kazan and Innopolis, Russia, August 24-27 (2015) Detailed reference viewed: 68 (2 UL)![]() Horne, Ross James ![]() Book published by Springer (2015) Detailed reference viewed: 14 (1 UL)![]() ; Horne, Ross James ![]() in Journal of Logical and Algebraic Methods in Programming (2015), 84(4), 485-504 Detailed reference viewed: 57 (1 UL)![]() Horne, Ross James ![]() in Scientific Annals of Computer Science (2015), 25(2), 245-316 Detailed reference viewed: 65 (3 UL) |
||