172 research outputs found
A Formal Theory of Key Conjuring
Key conjuring is the process by which an attacker obtains an unknown, encrypted key by repeatedly calling a cryptographic API function with random values in place of keys. We propose a formalism for detecting computationally feasible key conjuring operations, incorporated into a Dolev-Yao style model of the security API. We show that security in the presence of key conjuring operations is decidable for a particular class of APIs, which includes the key management API of IBM’s Common Cryptographic Architecture (CCA)
Automating Security Analysis: Symbolic Equivalence of Constraint Systems
We consider security properties of cryptographic protocols, that are either trace properties (such as confidentiality or authenticity) or equivalence properties (such as anonymity or strong secrecy). Infinite sets of possible traces are symbolically represented using deducibility constraints. We give a new algorithm that decides the trace equivalence for the traces that are represented using such constraints, in the case of signatures, symmetric and asymmetric encryptions. Our algorithm is implemented and performs well on typical benchmarks. This is the first implemented algorithm, deciding symbolic trace equivalence
Emerg. Infect. Dis
The multidrug-resistant (MDR) Salmonella enterica serotype Newport strain that produces CMY-2 β-lactamase(Newport MDR-AmpC) was the source of sporadic cases and outbreaks in humans in France during 2000–2005. Because this strain was not detected in food animals, it was most likely introduced into France through imported food products
Deduction with XOR Constraints in Security API Modelling
We introduce XOR constraints, and show how they enable a theorem prover to reason effectively about security critical subsystems which employ bitwise XOR. Our primary case study is the API of the IBM 4758 hardware security module. We also show how our technique can be applied to standard security protocols
Privacy Architectures: Reasoning About Data Minimisation and Integrity
Privacy by design will become a legal obligation in the European Community if
the Data Protection Regulation eventually gets adopted. However, taking into
account privacy requirements in the design of a system is a challenging task.
We propose an approach based on the specification of privacy architectures and
focus on a key aspect of privacy, data minimisation, and its tension with
integrity requirements. We illustrate our formal framework through a smart
metering case study.Comment: appears in STM - 10th International Workshop on Security and Trust
Management 8743 (2014
Identification of new transitions and mass assignments of levels in Pr
The previously reported levels assigned to 151,152,153Pr have recently been
called into question regarding their mass assignment. The above questioned
level assignments are clarified by measuring g-transitions tagged with A and Z
in an in-beam experiment in addition to the measurements from 252Cf spontaneous
fission (SF) and establish new spectroscopic information from to
in the Pr isotopic chain. The isotopic chain 143-153Pr has been studied from
the spontaneous fission of 252Cf by using Gammasphere and also from the
measurement of the prompt g-rays in coincidence with isotopically-identified
fission fragments using VAMOS++ and EXOGAM at GANIL. The latter were produced
using 238U beams on a 9Be target at energies around the Coulomb barrier. The
g-g-g-g data from 252Cf (SF) and those from the GANIL in-beam A- and Z-gated
spectra were combined to unambiguously assign the various transitions and
levels in 151,152,153Pr and other isotopes. New transitions and bands in
145,147,148,149,150Pr were identified by using g-g-g and g-g-g-g coincidences
and A and Z gated g-g spectra. The transitions and levels previously assigned
to 151,153Pr have been confirmed by the (A,Z) gated spectra. The transitions
previously assigned to 152Pr are now assigned to 151Pr on the basis of the
(A,Z) gated spectra. Two new bands with 20 new transitions in 152Pr and one new
band with 7 new transitions in 153Pr are identified from the g-g-g-g
coincidence spectra and the (A,Z) gated spectrum. In addition, new g-rays are
also reported in 143-146Pr. New levels of 145,147-153Pr have been established,
reliable mass assignments of the levels in 151,152,153Pr have been reported and
new transitions have been identified in 143-146Pr showing the new avenues that
are opened by combining the two experimental approaches.Comment: Accepted in Phys. Rev.
The hitchhiker's guide to decidability and complexity of equivalence properties in security protocols
International audiencePrivacy-preserving security properties in cryptographic protocols are typically modelled by observational equivalences in process calculi such as the applied pi-calulus. We survey decidability and complexity results for the automated verification of such equivalences, casting existing results in a common framework which allows for a precise comparison. This unified view, beyond providing a clearer insight on the current state of the art, allowed us to identify some variations in the statements of the decision problems-sometimes resulting in different complexity results. Additionally, we prove a couple of novel or strengthened results
- …