Skip to main content

Showing 1–9 of 9 results for author: Ramsdell, J

.
  1. arXiv:2402.00203  [pdf, ps, other

    cs.CR

    Evidence Tampering and Chain of Custody in Layered Attestations

    Authors: Ian D. Kretz, Clare C. Parran, John D. Ramsdell, Paul D. Rowe

    Abstract: In distributed systems, trust decisions are made on the basis of integrity evidence generated via remote attestation. Examples of the kinds of evidence that might be collected are boot time image hash values; fingerprints of initialization files for userspace applications; and a comprehensive measurement of a running kernel. In layered attestations, evidence is typically composed of measurements o… ▽ More

    Submitted 31 January, 2024; originally announced February 2024.

    Comments: 25 pages

  2. arXiv:1912.09910  [pdf, other

    cs.IR

    Report on the First HIPstIR Workshop on the Future of Information Retrieval

    Authors: Laura Dietz, Bhaskar Mitra, Jeremy Pickens, Hana Anber, Sandeep Avula, Asia Biega, Adrian Boteanu, Shubham Chatterjee, Jeff Dalton, Shiri Dori-Hacohen, John Foley, Henry Feild, Ben Gamari, Rosie Jones, Pallika Kanani, Sumanta Kashyapi, Widad Machmouchi, Matthew Mitsui, Steve Nole, Alexandre Tachard Passos, Jordan Ramsdell, Adam Roegiest, David Smith, Alessandro Sordoni

    Abstract: The vision of HIPstIR is that early stage information retrieval (IR) researchers get together to develop a future for non-mainstream ideas and research agendas in IR. The first iteration of this vision materialized in the form of a three day workshop in Portsmouth, New Hampshire attended by 24 researchers across academia and industry. Attendees pre-submitted one or more topics that they want to pi… ▽ More

    Submitted 20 December, 2019; originally announced December 2019.

  3. arXiv:1804.07158  [pdf, ps, other

    cs.CR

    Homomorphisms and Minimality for Enrich-by-Need Security Analysis

    Authors: Daniel J. Dougherty, Joshua D. Guttman, John D. Ramsdell

    Abstract: Cryptographic protocols are used in different environments, but existing methods for protocol analysis focus only on the protocols, without being sensitive to assumptions about their environments. LPA is a tool which analyzes protocols in context. LPA uses two programs, cooperating with each other: CPSA, a well-known system for protocol analysis, and Razor, a model-finder based on SMT technology.… ▽ More

    Submitted 19 April, 2018; originally announced April 2018.

  4. arXiv:1804.05713  [pdf, other

    cs.CR

    Enrich-by-need Protocol Analysis for Diffie-Hellman (Extended Version)

    Authors: Moses D. Liskov, Joshua D. Guttman, John D. Ramsdell, Paul D. Rowe, F. Javier Thayer

    Abstract: Enrich-by-need protocol analysis is a style of symbolic protocol analysis that characterizes all executions of a protocol that extend a given scenario. In effect, it computes a strongest security goal the protocol achieves in that scenario. CPSA, a Cryptographic Protocol Shapes Analyzer, implements enrich-by-need protocol analysis. In this paper, we describe how to analyze protocols using the Di… ▽ More

    Submitted 16 April, 2018; originally announced April 2018.

    Comments: 53 pages

  5. Formal Support for Standardizing Protocols with State

    Authors: Joshua D. Guttman, Moses D. Liskov, John D. Ramsdell, Paul D. Rowe

    Abstract: Many cryptographic protocols are designed to achieve their goals using only messages passed over an open network. Numerous tools, based on well-understood foundations, exist for the design and analysis of protocols that rely purely on message passing. However, these tools encounter difficulties when faced with protocols that rely on non-local, mutable state to coordinate several local sessions.… ▽ More

    Submitted 24 September, 2015; originally announced September 2015.

  6. arXiv:1404.3899  [pdf, ps, other

    cs.CR

    A Hybrid Analysis for Security Protocols with State

    Authors: John D. Ramsdell, Daniel J. Dougherty, Joshua D. Guttman, Paul D. Rowe

    Abstract: Cryptographic protocols rely on message-passing to coordinate activity among principals. Each principal maintains local state in individual local sessions only as needed to complete that session. However, in some protocols a principal also uses state to coordinate its different local sessions. Sometimes the non-local, mutable state is used as a means, for example with smart cards or Trusted Platfo… ▽ More

    Submitted 16 June, 2014; v1 submitted 15 April, 2014; originally announced April 2014.

  7. arXiv:1403.3563  [pdf, other

    cs.CR

    Proving Security Goals With Shape Analysis Sentences

    Authors: John D. Ramsdell

    Abstract: The paper that introduced shape analysis sentences presented a method for extracting a sentence in first-order logic that completely characterizes a run of CPSA. Logical deduction can then be used to determine if a security goal is satisfied. This paper presents a method for importing shape analysis sentences into a proof assistant on top of a detailed theory of strand spaces. The result is a se… ▽ More

    Submitted 14 March, 2014; originally announced March 2014.

    Comments: MITRE Technical Report. arXiv admin note: substantial text overlap with arXiv:1204.0480

    Report number: MTR130488

  8. arXiv:1207.0418  [pdf, ps, other

    cs.CR

    An Analysis of the CAVES Attestation Protocol using CPSA

    Authors: John D. Ramsdell, Joshua D. Guttman, Jonathan K. Millen, Brian O'Hanlon

    Abstract: This paper describes the CAVES attestation protocol and presents a tool-supported analysis showing that the runs of the protocol achieve stated goals. The goals are stated formally by annotating the protocol with logical formulas using the rely-guarantee method. The protocol analysis tool used is the Cryptographic Protocol Shape Analyzer.

    Submitted 2 July, 2012; originally announced July 2012.

    Report number: MITRE Technical Report MTR090213

  9. arXiv:1204.0480  [pdf, ps, other

    cs.CR cs.LO

    Deducing Security Goals From Shape Analysis Sentences

    Authors: John D. Ramsdell

    Abstract: Guttman presented a model-theoretic approach to establishing security goals in the context of Strand Space theory. In his approach, a run of the Cryptographic Protocol Shapes Analyzer (CPSA) produces models that determine if a goal is satisfied. This paper presents a method for extracting a sentence that completely characterizes a run of CPSA. Logical deduction can then be used to determine if a g… ▽ More

    Submitted 5 February, 2018; v1 submitted 2 April, 2012; originally announced April 2012.

    Comments: 19 pages