메뉴 건너뛰기




Volumn 9, Issue 11, 2003, Pages 1350-1369

An information flow method to detect denial of service vulnerabilities

Author keywords

Admissible interference; Bisimulation; Denial of service; Equivalence checking; Protocols

Indexed keywords


EID: 1442292328     PISSN: 0958695X     EISSN: 09486968     Source Type: Journal    
DOI: None     Document Type: Conference Paper
Times cited : (7)

References (26)
  • 1
    • 0000298407 scopus 로고    scopus 로고
    • A bisimulation method for cryptographic protocols
    • [Abadi and Gordon 1998]
    • [Abadi and Gordon 1998] Abadi, M., Gordon, A. D.: "A bisimulation method for cryptographic protocols"; Nordic Journal of Computing, 5, 4 (1998), 267-303.
    • (1998) Nordic Journal of Computing , vol.5 , Issue.4 , pp. 267-303
    • Abadi, M.1    Gordon, A.D.2
  • 3
    • 0347006666 scopus 로고
    • Notes on algebraic calculi of processes
    • [Boudol 1985], NATO ASI Series F-13, Springer
    • [Boudol 1985] Boudol, G.: "Notes on algebraic calculi of processes": Proc. Logic and Models of Concurrent Systems, NATO ASI Series F-13, Springer (1985), 261-303.
    • (1985) Proc. Logic and Models of Concurrent Systems , pp. 261-303
    • Boudol, G.1
  • 4
    • 20144382038 scopus 로고    scopus 로고
    • Observational equivalence and trace equivalence in an extension of spi-calculus. Application to cryptographic protocols analysis
    • [Cortier 2002], Lab. Specification and Verification, ENS de Cachan, Cachan, France
    • [Cortier 2002] Cortier, V.: "Observational equivalence and trace equivalence in an extension of spi-calculus. application to cryptographic protocols analysis"; Technical Report LSV-02-3, Lab. Specification and Verification, ENS de Cachan, Cachan, France (2002).
    • (2002) Technical Report , vol.LSV-02-3
    • Cortier, V.1
  • 5
    • 0008723266 scopus 로고    scopus 로고
    • Distributed denial of service trin00, tribe flood network, tribe flood network 2000, and stacheldraht
    • [Criscuolo 2000], Lawrence Livermore National Laboratory (Feb)
    • [Criscuolo 2000] Criscuolo, P. J.: "Distributed denial of service trin00, tribe flood network, tribe flood network 2000, and stacheldraht"; Technical Report CIAC-2319, Lawrence Livermore National Laboratory (Feb 2000).
    • (2000) Technical Report , vol.CIAC-2319
    • Criscuolo, P.J.1
  • 7
    • 1242350159 scopus 로고    scopus 로고
    • Analyzing distributed denial of service tools: The shaft case
    • [Dietrich et al. 2000]
    • [Dietrich et al. 2000] Dietrich, S., Long, N., Dittrich, D.: "Analyzing distributed denial of service tools: The shaft case"; Proc. USENIX LISA (2000).
    • (2000) Proc. USENIX LISA
    • Dietrich, S.1    Long, N.2    Dittrich, D.3
  • 10
    • 84974776068 scopus 로고
    • A classification of security properties for process algebras
    • [Focardi and Gorrieri 1994/1995]
    • [Focardi and Gorrieri 1994/1995] Focardi, R., Gorrieri, R.: "A classification of security properties for process algebras"; Journal of Computer Security, 3, 1 (1994/1995), 5-33.
    • (1994) Journal of Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 12
    • 0003161603 scopus 로고    scopus 로고
    • Fail-stop protocols: An approach to designing secure protocols
    • [Gong and Syverson 1998], IEEE Computer Society
    • [Gong and Syverson 1998] Gong, L., Syverson, P.: "Fail-stop protocols: An approach to designing secure protocols"; Proc. Dependable Computing for Critical Applications, 5, IEEE Computer Society (1998), 79-100.
    • (1998) Proc. Dependable Computing for Critical Applications , vol.5 , pp. 79-100
    • Gong, L.1    Syverson, P.2
  • 13
    • 4944237116 scopus 로고    scopus 로고
    • Bisimulation-based non-deterministic admissible interference and its application to the analysis of cryptographic protocols
    • [Lafrance and Mullins 2002a], Harland, J. (editor), Elsevier Science Publishers
    • [Lafrance and Mullins 2002a] Lafrance, S., Mullins, J.: "Bisimulation-based non-deterministic admissible interference and its application to the analysis of cryptographic protocols"; Proc. Electronic Notes in Theoretical Computer Science, 61, Harland, J. (editor), Elsevier Science Publishers (2002).
    • (2002) Proc. Electronic Notes in Theoretical Computer Science , vol.61
    • Lafrance, S.1    Mullins, J.2
  • 14
    • 0041860183 scopus 로고    scopus 로고
    • A generic enemy process for the analysis of cryptoprotocols
    • [Lafrance and Mullins 2002b]
    • [Lafrance and Mullins 2002b] Lafrance, S., Mullins, J.: "A generic enemy process for the analysis of cryptoprotocols"; Proc. FSCBS'2002 (2002). Available at www.crac.polymtl.ca/mullins.
    • (2002) Proc. FSCBS'2002
    • Lafrance, S.1    Mullins, J.2
  • 15
    • 84867442647 scopus 로고    scopus 로고
    • A symbolic approach to the analysis of security protocols
    • [Lafrance and Mullins 2003], Ottawa
    • [Lafrance and Mullins 2003] Lafrance, S., Mullins, J.: "A symbolic approach to the analysis of security protocols"; Proc. of Foundations of Computer Security affiliated with LICS'09, Ottawa (2003). Available at http://theory.stanford.edu/iliano/fcs03/www/
    • (2003) Proc. of Foundations of Computer Security Affiliated with LICS'09
    • Lafrance, S.1    Mullins, J.2
  • 16
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • [Meadows 1996]
    • [Meadows 1996] Meadows, C.: "The NRL protocol analyzer: An overview"; Journal of Logic Programming, 26, 2 (1996), 113-131.
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 17
    • 0035075103 scopus 로고    scopus 로고
    • A cost-based framework for analysis of denial of service networks
    • [Meadows 2001]
    • [Meadows 2001] Meadows, C.: "A cost-based framework for analysis of denial of service networks"; Journal of Computer Security, 9, 1/2 (2001), 143-164.
    • (2001) Journal of Computer Security , vol.9 , Issue.1-2 , pp. 143-164
    • Meadows, C.1
  • 18
    • 0026850008 scopus 로고
    • A resource allocation model for denial of service
    • [Millen 1992], IEEE Computer Society Press
    • [Millen 1992] Millen, J.: "A resource allocation model for denial of service"; Proc. of the 1992 IEEE Symposium on Security and Privacy, IEEE Computer Society Press (1992), 137- 147.
    • (1992) Proc. of the 1992 IEEE Symposium on Security and Privacy , pp. 137-147
    • Millen, J.1
  • 20
    • 0042361083 scopus 로고    scopus 로고
    • Nondeterministic admissible interference
    • [Mullins 2000]
    • [Mullins 2000] Mullins, J.: "Nondeterministic admissible interference"; Journal of Universal Computer Science, 6, 11 (2000), 1054-1070.
    • (2000) Journal of Universal Computer Science , vol.6 , Issue.11 , pp. 1054-1070
    • Mullins, J.1
  • 23
    • 0003502331 scopus 로고
    • Noninterference, transitivity and channel-control security policies
    • [Rushby 1992], SRI International, Menlo Park CA, USA (Dec)
    • [Rushby 1992] Rushby, J.: "Noninterference, transitivity and channel-control security policies"; Technical Report CSL-92-02, SRI International, Menlo Park CA, USA (Dec 1992).
    • (1992) Technical Report , vol.CSL-92-02
    • Rushby, J.1
  • 26
    • 0023829320 scopus 로고
    • A formal specification and verification method for the prevention of denial of service
    • [Yu and Gligor 1988], IEEE Computer Society Press (Apr)
    • [Yu and Gligor 1988] Yu, C., Gligor, V. D.: "A formal specification and verification method for the prevention of denial of service"; Proc. 1988 IEEE Symposium on Security and Privacy, 117, IEEE Computer Society Press (Apr 1988), 187-202.
    • (1988) Proc. 1988 IEEE Symposium on Security and Privacy , vol.117 , pp. 187-202
    • Yu, C.1    Gligor, V.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.