메뉴 건너뛰기




Volumn 367, Issue 1-2, 2006, Pages 257-270

Formal analysis of PIN block attacks

Author keywords

Constraint logic programming; PIN blocks; Probabilistic model checking; Security API analysis

Indexed keywords

CRYPTOGRAPHY; ENCODING (SYMBOLS); INTERFACES (COMPUTER); LOGIC PROGRAMMING; PROBABILISTIC LOGICS; SECURITY SYSTEMS;

EID: 33750486826     PISSN: 03043975     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.tcs.2006.08.042     Document Type: Article
Times cited : (18)

References (14)
  • 1
    • 0035475290 scopus 로고    scopus 로고
    • M. Bond, R. Anderson, API level attacks on embedded systems, IEEE Comput. Mag. (2001) 67-75.
  • 2
    • 33750440662 scopus 로고    scopus 로고
    • M. Bond, P. Zieliński, Decimalisation table attacks for PIN cracking, Technical Report UCAM-CL-TR-560, University of Cambridge, January 2003.
  • 3
    • 84923057783 scopus 로고    scopus 로고
    • M. Carlsson, G. Ottosson, B. Carlson, An open-ended finite domain constraint solver, in: Proc. Programming Languages: Implementations, Logics, and Programs, Southampton, UK, September 1997, pp. 191-206.
  • 4
    • 33750493170 scopus 로고    scopus 로고
    • J. Clulow, The design and analysis of cryptographic APIs for security devices, Master's Thesis, University of Natal, Durban, 2003.
  • 5
    • 26844469379 scopus 로고    scopus 로고
    • P. Drielsma, S. Mödersheim, L. Viganò, A formalization of off-line guessing for security protocol analysis, in: F. Baader, A. Voronkov (Eds.), LPAR, Lecture Notes in Artificial Intelligence, Vol. 3452, ETH Zürich, Computer Science, Springer, Berlin, 2005, pp. 363-379.
  • 7
    • 0003096318 scopus 로고
    • A logic for reasoning about time and reliability
    • Hansson H., and Jonsson B. A logic for reasoning about time and reliability. Formal Aspects Comput. 6 5 (1994) 512-535
    • (1994) Formal Aspects Comput. , vol.6 , Issue.5 , pp. 512-535
    • Hansson, H.1    Jonsson, B.2
  • 9
    • 0026837069 scopus 로고
    • An automatic search for security flaws in key management schemes
    • Longley D., and Rigby S. An automatic search for security flaws in key management schemes. Comput. Security 11 1 (1992) 75-89
    • (1992) Comput. Security , vol.11 , Issue.1 , pp. 75-89
    • Longley, D.1    Rigby, S.2
  • 10
    • 0344875574 scopus 로고    scopus 로고
    • Analysing protocol subject to guessing attacks
    • Lowe G. Analysing protocol subject to guessing attacks. J. Comput. Security 12 1 (2004) 83-98
    • (2004) J. Comput. Security , vol.12 , Issue.1 , pp. 83-98
    • Lowe, G.1
  • 12
    • 84948775332 scopus 로고    scopus 로고
    • V. Shmatikov, Probabilistic analysis of anonymity, in: CSFW '02: Proc. 15th IEEE Computer Security Foundations Workshop (CSFW'02), Washington, DC, USA, 2002, IEEE Computer Society, pp. 119-128.
  • 13
    • 26944468299 scopus 로고    scopus 로고
    • G. Steel, Deduction with XOR constraints in security API modelling, in: R. Nieuwenhuis (Ed.), Proc. 20th Conf. on Automated Deduction (CADE 20), Tallinn, Estonia, July 2005, Lecture Notes in Artificial Intelligence, Vol. 3632, Springer, Heidelberg, pp. 322-336.
  • 14
    • 33750445829 scopus 로고    scopus 로고
    • P. Youn, B. Adida, M. Bond, J. Clulow, J. Herzog, A. Lin, R. Rivest, R. Anderson, Robbing the bank with a theorem prover, Technical Report UCAM-CL-TR-644, University of Cambridge, August 2005.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.