COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. |
University of Cambridge > Talks.cam > Computer Laboratory Security Seminar > Distance bounding protocols: Authentication logic analysis
Distance bounding protocols: Authentication logic analysisAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Saar Drimer. Note unusual room, day and hour The analysis of cryptographic protocols is by now a well established application area for formal methods. However, there are many protocols that go beyond the traditional Dolev-Yao model for which these formal methods have been developed. In this talk we examine a particular class of such protocols, distance bounding protocols, designed to authenticate distance measurements in sensor networks. These rely not only on assumptions about the soundness of cryptographic functions, but on physical assumptions about the time of flight of signals. We adapt the authentication logic of Pavlovic, Meadows, and Cervesato to reason about these protocols by incorporating the physical assumptions necessary as axioms and definitions in the system, and apply it to the analysis of a family of distance bounding protocols. We also discuss the potential for adding probabilistic reasoning to the logic to better capture the necessary physical assumptions. This talk is part of the Computer Laboratory Security Seminar series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsWomen's Staff Network Physics of Living Matter PLM6 Cyber Security Society talksOther talksThe microenvironment in the myeloid malignancies Activism and scholarship: Fahamu's role in shaping knowledge production in Africa Bayesian optimal design for Gaussian process model Measuring Designing: Design Cognitiometrics, Physiometrics & Neurometrics Graded linearisations for linear algebraic group actions The Anne McLaren Lecture: CRISPR-Cas Gene Editing: Biology, Technology and Ethics Understanding mechanisms and targets of malaria immunity to advance vaccine development Structural basis for human mitochondrial DNA replication, repair and antiviral drug toxicity Enhanced Decision Making in Drug Discovery |