12 research outputs found
A Security Formal Verification Method for Protocols Using Cryptographic Contactless Smart Cards
We present a method of contactless smart card protocol modeling suitable for finding vulnerabilities using model checking. Smart cards are used in applications that require high level of security, such as payment applications, therefore it should be ensured that the implementation does not contain any vulnerabilities. High level application specifications may lead to different implementations. Protocol that is proved to be secure on high level and that uses secure smart card can be implemented in more than one way, some of these implementations are secure, some of them introduce vulnerabilities to the application. The goal of this paper is to provide a method that can be used to create a model of arbitrary smart card, with focus on contactless smart cards, to create a model of the protocol, and to use model checking to find attacks in this model. AVANTSSAR Platform was used for the formal verification, the models are written in the ASLan++ language. Examples demonstrate the usability of the proposed method
Simulation and Evaluation of CTP and Secure-CTP Protocols
The paper discusses characteristics and qualities of two routing protocols – Collection Tree Protocol and its secure modification. The original protocol, as well as other protocols for wireless sensors, solves only problems of ra- dio communication and limited resources. Our design of the secure protocol tries to solve also the essential security ob- jectives. For the evaluation of properties of our protocol in large networks, a TOSSIM simulator was used. Our effort was to show the influence of the modification of the routing protocol to its behavior and quality of routing trees. We have proved that adding security into protocol design does not necessarily mean higher demands for data transfer, power consumption or worse protocol efficiency. In the paper, we manifest that security in the protocol may be achieved with low cost and may offer similar performance as the original protocol
Analyses of Real Email Traffic Properties
In this paper, we perform an empirical analysis of email traffic logs obtained from a large university to better understand its impact on the effectiveness and efficiency of anonymous mix remailers. We analyzed data containing records of almost 790,000 emails sent over a period of forty days – the largest dataset we are aware of. The initial analysis of data is followed by an exploration of how variance in message arrival time and size impact the anonymity and efficiency provided by timed and threshold mixes, respectively. The analysis results are subsequently explored for their possible impact on traffic analysis
Genetic transformation of pea for improved tolerance / resistance to fungal pathogens and insect pests
International audienc
Genetic transformation of pea for improved tolerance / resistance to fungal pathogens and insect pests
International audienc