-
1
-
-
0035475290
-
API level attacks on embedded systems
-
October
-
M. Bond and R. Anderson. API level attacks on embedded systems. IEEE Computer Magazine, pages 67-75, October 2001.
-
(2001)
IEEE Computer Magazine
, pp. 67-75
-
-
Bond, M.1
Anderson, R.2
-
2
-
-
33749446224
-
Hierarchical combination of intruder theories
-
Proc. 17th International Conference on Term Rewriting and Applications RTA'06, of, Seattle, USA, Springer
-
Y. Chevalier and M. Rusinowitch. Hierarchical combination of intruder theories. In Proc. 17th International Conference on Term Rewriting and Applications (RTA'06), volume 4098 of LNCS, pages 108-122, Seattle, USA, 2006. Springer.
-
(2006)
LNCS
, vol.4098
, pp. 108-122
-
-
Chevalier, Y.1
Rusinowitch, M.2
-
3
-
-
84937557946
-
NuSMV Version 2: An OpenSource Tool for Symbolic Model Checking
-
Proc. International Conference on Computer-Aided Verification CAV'02, of, Copenhagen, Denmark, July, Springer
-
A. Cimatti, E. Clarke, E. Giunchiglia, F. Giunchiglia, M. Pistore, M. Roveri, R. Sebastiani, and A. Tacchella. NuSMV Version 2: An OpenSource Tool for Symbolic Model Checking. In Proc. International Conference on Computer-Aided Verification (CAV'02), volume 2404 of LNCS, pages 359-364, Copenhagen, Denmark, July 2002. Springer.
-
(2002)
LNCS
, vol.2404
, pp. 359-364
-
-
Cimatti, A.1
Clarke, E.2
Giunchiglia, E.3
Giunchiglia, F.4
Pistore, M.5
Roveri, M.6
Sebastiani, R.7
Tacchella, A.8
-
4
-
-
35248891063
-
Proceedings of the 5th International Worshop on Cryptographic Hardware and Embedded Systems (CHES'03)
-
On the security of PKCS#11, of, Cologne, Germany, Springer
-
J. Clulow. On the security of PKCS#11. In Proceedings of the 5th International Worshop on Cryptographic Hardware and Embedded Systems (CHES'03), volume 2779 of LNCS, pages 411-425, Cologne, Germany, 2003. Springer.
-
(2003)
LNCS
, vol.2779
, pp. 411-425
-
-
Clulow, J.1
-
5
-
-
35048847541
-
A formal theory of key conjuring
-
Venice, Italy
-
V. Cortier, S. Delaune, and G. Steel. A formal theory of key conjuring. In Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSF'07), pages 79-93, Venice, Italy, 2007.
-
(2007)
Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSF'07)
, pp. 79-93
-
-
Cortier, V.1
Delaune, S.2
Steel, G.3
-
6
-
-
35048861214
-
Automatic analysis of the security of xor-based key management schemes
-
Proceedings of the 13th International Conference on Tools and Algorithms for the Construction and Analysis of Systems TACAS'07, of, Braga, Portugal, Springer
-
V. Cortier, G. Keighren, and G. Steel. Automatic analysis of the security of xor-based key management schemes. In Proceedings of the 13th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'07), volume 4424 of LNCS, pages 538-552, Braga, Portugal, 2007. Springer.
-
(2007)
LNCS
, vol.4424
, pp. 538-552
-
-
Cortier, V.1
Keighren, G.2
Steel, G.3
-
8
-
-
0016543936
-
Guarded commands, nondeterminacy and formal derivation of programs
-
E. W. Dijkstra. Guarded commands, nondeterminacy and formal derivation of programs. Commun. ACM, 18(8):453-457, 1975.
-
(1975)
Commun. ACM
, vol.18
, Issue.8
, pp. 453-457
-
-
Dijkstra, E.W.1
-
9
-
-
0020720357
-
On the security of public key protocols
-
March
-
D. Dolev and A. Yao. On the security of public key protocols. IEEE Transactions in Information Theory, 2(29):198-208, March 1983.
-
(1983)
IEEE Transactions in Information Theory
, vol.2
, Issue.29
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
10
-
-
3042538605
-
Multiset rewriting and the complexity of bounded security protocols
-
N. A. Durgin, P. Lincoln, and J. C. Mitchell. Multiset rewriting and the complexity of bounded security protocols. Journal of Computer Security, 12(2):247-311, 2004.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.2
, pp. 247-311
-
-
Durgin, N.A.1
Lincoln, P.2
Mitchell, J.C.3
-
11
-
-
33747255010
-
Applying protocol analysis to security device interfaces
-
July-Aug
-
J. Herzog. Applying protocol analysis to security device interfaces. IEEE Security & Privacy Magazine, 4(4):84-87, July-Aug 2006.
-
(2006)
IEEE Security & Privacy Magazine
, vol.4
, Issue.4
, pp. 84-87
-
-
Herzog, J.1
-
12
-
-
0026837069
-
An automatic search for security flaws in key management schemes
-
March
-
D. Longley and S. Rigby. An automatic search for security flaws in key management schemes. Computers and Security, 11(1):75-89, March 1992.
-
(1992)
Computers and Security
, vol.11
, Issue.1
, pp. 75-89
-
-
Longley, D.1
Rigby, S.2
-
13
-
-
84947295756
-
Multiset rewriting and security protocol analysis
-
Proc. 13th International Conference on Rewriting Techniques and Applications RTA'02, of, Copenhagen, Denmark, Springer
-
J. C. Mitchell. Multiset rewriting and security protocol analysis. In Proc. 13th International Conference on Rewriting Techniques and Applications (RTA'02), volume 2378 of LNCS, pages 19-22, Copenhagen, Denmark, 2002. Springer.
-
(2002)
LNCS
, vol.2378
, pp. 19-22
-
-
Mitchell, J.C.1
-
14
-
-
51749102070
-
-
RSA Security Inc., v2.20. PKCS #11: Cryptographic Token Interface Standard., June 2004.
-
RSA Security Inc., v2.20. PKCS #11: Cryptographic Token Interface Standard., June 2004.
-
-
-
-
15
-
-
26944468299
-
Deduction with XOR constraints in security API modelling
-
Proceedings of the 20th International Conference on Automated Deduction CADE'05, of, Tallinn, Estonia, Springer
-
G. Steel. Deduction with XOR constraints in security API modelling. In Proceedings of the 20th International Conference on Automated Deduction (CADE'05), volume 3632 of LNCS, pages 322-336, Tallinn, Estonia, 2005. Springer.
-
(2005)
LNCS
, vol.3632
, pp. 322-336
-
-
Steel, G.1
-
16
-
-
51749122352
-
-
F. L. Tiplea, C. Enea, and C. V. Birjoveanu. Decidability and complexity results for security protocols. In Proceedings of the Verification of Infinite-State Systems with Applications to Security (VISSAS'05), 1 of NATO Security through Science Series D: Information and Communication Security, pages 185-211. IOS Press, 2005.
-
F. L. Tiplea, C. Enea, and C. V. Birjoveanu. Decidability and complexity results for security protocols. In Proceedings of the Verification of Infinite-State Systems with Applications to Security (VISSAS'05), volume 1 of NATO Security through Science Series D: Information and Communication Security, pages 185-211. IOS Press, 2005.
-
-
-
-
17
-
-
51749108116
-
-
E. Tsalapati. Analysis of PKCS#11 using AVISPA tools. Master's thesis, University of Edinburgh, 2007.
-
E. Tsalapati. Analysis of PKCS#11 using AVISPA tools. Master's thesis, University of Edinburgh, 2007.
-
-
-
-
19
-
-
35048819862
-
Robbing the bank with a theorem prover
-
Technical Report UCAM-CL-TR-644, University of Cambridge, August
-
P. Youn, B. Adida, M. Bond, J. Clulow, J. Herzog, A. Lin, R. Rivest, and R. Anderson. Robbing the bank with a theorem prover. Technical Report UCAM-CL-TR-644, University of Cambridge, August 2005.
-
(2005)
-
-
Youn, P.1
Adida, B.2
Bond, M.3
Clulow, J.4
Herzog, J.5
Lin, A.6
Rivest, R.7
Anderson, R.8
|