Please use this identifier to cite or link to this item:
https://www.um.edu.mt/library/oar/handle/123456789/91852
Title: | Applying runtime verification to group key establishment |
Authors: | Colombo, Christian González Vasco, María Isabel Vella, Mark Joseph Zajac, Pavol |
Keywords: | Aspect-oriented programming Computer software -- Development Real-time data processing Java (Computer program language) |
Issue Date: | 2019 |
Publisher: | SPS |
Citation: | Colombo, C., Gonzalez Vasco, M. I., Vella, M., & Zajac, P. (2019). Applying runtime verification to group key establishment. Secure Communication in the Quantum Era (SPS G5448), Slovakia. 1-2 |
Abstract: | Securing communication networks relies fundamentally on the availability of secure cryptographic primitives, which enable authentication, confidentiality, and integrity. A typical starting point to establish secure communication channels is the execution of a protocol that authenticates all involved users/devices and establishes a common secret key among them. This task is referred to as authenticated group key establishment (AGKE). It is standard cryptographic practice to establish provable security guarantees in a suitable theoretical model, abstracting from implementation details. Modeling parties as Turing machines and adversarial capabilities through abstract oracles is a common technique that facilitates a theoretical analysis, but the implementation of a “theoretically secure” protocol may well be susceptible to runtime attacks. A number of authors have explored the use of runtime verification as a means of hardening a security-critical protocol implementation [2, 10, 7, 8]. The aim of this presentation is to give a brief overview of these works. |
URI: | https://www.um.edu.mt/library/oar/handle/123456789/91852 |
Appears in Collections: | Scholarly Works - FacICTCS |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Applying_runtime_verification_to_group_key_establishment.pdf Restricted Access | 106.07 kB | Adobe PDF | View/Open Request a copy |
Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.