ACM Transactions on Computer Systems (TOCS)
A compositional approach to performance modelling
A compositional approach to performance modelling
Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Classification of Security Properties (Part I: Information Flow)
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Nordic Journal of Computing
Probabilistic Noninterference in a Concurrent Language
CSFW '98 Proceedings of the 11th IEEE workshop on Computer Security Foundations
IPDPS '03 Proceedings of the 17th International Symposium on Parallel and Distributed Processing
Flow logic: a multi-paradigmatic approach to static analysis
The essence of computation
On Confidentiality and Algorithms
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
WOSP '04 Proceedings of the 4th international workshop on Software and performance
A simple framework for real-time cryptographic protocol analysis with compositional proof rules
Science of Computer Programming - Special issue on 12th European symposium on programming (ESOP 2003)
A calculus for control flow analysis of security protocols
International Journal of Information Security - Special issue on security in global computing
Remote timing attacks are practical
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
On the security of public key protocols
SFCS '81 Proceedings of the 22nd Annual Symposium on Foundations of Computer Science
Real-time information flow analysis
IEEE Journal on Selected Areas in Communications
SFM'07 Proceedings of the 7th international conference on Formal methods for performance evaluation
Efficient solutions of a PEPA model of a key distribution centre
Performance Evaluation
Peeping tom in the neighborhood: keystroke eavesdropping on multi-user systems
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Hi-index | 0.00 |
We present a federated analysis of communication protocols which considers both security properties and timing. These are not entirely independent observations of a protocol; by using timing observations of an executing protocol it is possible to calculate encryption keys which were intended to be secret or to deduce derived information about the nature of the communication even in the presence of unbreakable encryption. Our analysis is based on expressing the protocol as a high-level model and deriving from this process calculus models analysable by the Imperial PEPA Compiler and the LySatool. ot represent single instances of systems, but actually whole (possibly infinite) classes of instances. The goal is to show the correctness independently of the parameter and thus for the whole class. For example, one wants to show the correctness of a communication protocol for an arbitrary number n of participants or the correctness of an elevator control software for an arbitrary number n of floors. Parameterized verification is of special importance w.r.t. scalability of systems, i.e., one wants to show the correctness of a system with a certain basic structure independently of its size. While proof techniques have been used for such problems for some time, more recently also algorithmic and semi-algorithmic approaches are being developed. These often use automata theoretic models and acceleration techniques. The main topics of VEPAS 2001 were the following:*Abstract models for systems with an arbitrary number of components. *Scalability of systems and verification methods. *Abstraction methods and proof techniques in verification. *Automata theoretic models, fixpoints and acceleration methods. *Combinations of algorithms and proof techniques. VEPAS 2001 was one of the four satellite workshops of the 28th International Colloquium on Automata, Languages and Programming (ICALP 2001), held in Crete, Greece, July 8-12, 2001. The five papers in this volume were selected by the Program Committee from nine submissions received in response to a Call for Papers. The proceedings appear as Volume 50 No. 4 in the series Electronic Notes in Theoretical Computer Science (ENTCS). The volumes in the ENTCS series can be accessed at the URL http://www.elsevier.nl/locate/entcs. The program committee of VEPAS 2001 consisted of the following people:*Ahmed Bouajjani (Universite Paris 7, France) *Bengt Jonsson (Uppsala University, Sweden) *Antonin Kucera (Masaryk University, Czech Republic) *Richard Mayr (chair) (Albert-Ludwigs University Freiburg, Germany) *A. Prasad Sistla (University of Illinois at Chicago, USA) We would like to thank Christos Zaroliagis (ICALP 2001 Satellite Workshops Coordinator) for his continuous support. Many thanks are due to Parosh Abdulla and Ahmed Bouajjani (Invited Speakers) and to the members of the Program Committee as well as their sub-referees for their accurate work. July 2001 Richard Mayr