Skip to main content

Showing 1–4 of 4 results for author: Chothia, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2106.02623  [pdf, other

    cs.CR

    The Closer You Look, The More You Learn: A Grey-box Approach to Protocol State Machine Learning

    Authors: Chris McMahon Stone, Sam L. Thomas, Mathy Vanhoef, James Henderson, Nicolas Bailluet, Tom Chothia

    Abstract: In this paper, we propose a new approach to infer state machine models from protocol implementations. Our method, STATEINSPECTOR, learns protocol states by using novel program analyses to combine observations of run-time memory and I/O. It requires no access to source code and only lightweight execution monitoring of the implementation under test. We demonstrate and evaluate STATEINSPECTOR's effec… ▽ More

    Submitted 7 June, 2021; v1 submitted 4 June, 2021; originally announced June 2021.

  2. arXiv:1810.05345  [pdf, other

    cs.OS

    Time Protection: the Missing OS Abstraction

    Authors: Qian Ge, Yuval Yarom, Tom Chothia, Gernot Heiser

    Abstract: Timing channels enable data leakage that threatens the security of computer systems, from cloud platforms to smartphones and browsers executing untrusted third-party code. Preventing unauthorised information flow is a core duty of the operating system, however, present OSes are unable to prevent timing channels. We argue that OSes must provide time protection in addition to the established memory… ▽ More

    Submitted 15 October, 2018; v1 submitted 11 October, 2018; originally announced October 2018.

  3. arXiv:1706.01742  [pdf, ps, other

    cs.CR

    Types for Location and Data Security in Cloud Environments

    Authors: Ivan Gazeau, Tom Chothia, Dominic Duggan

    Abstract: Cloud service providers are often trusted to be genuine, the damage caused by being discovered to be attacking their own customers outweighs any benefits such attacks could reap. On the other hand, it is expected that some cloud service users may be actively malicious. In such an open system, each location may run code which has been developed independently of other locations (and which may be sec… ▽ More

    Submitted 6 June, 2017; originally announced June 2017.

    Comments: Short version to appear in Computer Security Foundations Symposium (CSF'17), August 2017

    Report number: Stevens Institute of Technology Technical Report CS-2017-1

  4. Timed Automata Semantics for Analyzing Creol

    Authors: Mohammad Mahdi Jaghoori, Tom Chothia

    Abstract: We give a real-time semantics for the concurrent, object-oriented modeling language Creol, by mapping Creol processes to a network of timed automata. We can use our semantics to verify real time properties of Creol objects, in particular to see whether processes can be scheduled correctly and meet their end-to-end deadlines. Real-time Creol can be useful for analyzing, for instance, abstract model… ▽ More

    Submitted 28 July, 2010; originally announced July 2010.

    Comments: In Proceedings FOCLASA 2010, arXiv:1007.4993

    Journal ref: EPTCS 30, 2010, pp. 108-122