Skip to main content

Showing 1–4 of 4 results for author: Liskov, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.02630  [pdf, ps, other

    cs.CR cs.DC

    Cryptographically Assured Information Flow: Assured Remote Execution

    Authors: Scott L. Dyer, Christian A. Femrite, Joshua D. Guttman, Julian P. Lanson, Moses D. Liskov

    Abstract: Assured Remote Execution on a device is the ability of suitably authorized parties to construct secure channels with known processes -- i.e. processes executing known code -- running on it. Assured Remote Execution requires a hardware basis including cryptographic primitives. In this paper, we show that a simple hardware-level mechanism called Cryptographically Assured Information Flow (CAIF) enab… ▽ More

    Submitted 20 September, 2024; v1 submitted 4 February, 2024; originally announced February 2024.

    Comments: 38 pp.We are grateful to the MITRE Independent Research and Development Program for support

  2. arXiv:2003.07421  [pdf, other

    cs.CR

    Formal Methods Analysis of the Secure Remote Password Protocol

    Authors: Alan T. Sherman, Erin Lanus, Moses Liskov, Edward Zieglar, Richard Chang, Enis Golaszewski, Ryan Wnuk-Fink, Cyrus J. Bonyadi, Mario Yaksetig, Ian Blumenfeld

    Abstract: We analyze the Secure Remote Password (SRP) protocol for structural weaknesses using the Cryptographic Protocol Shapes Analyzer (CPSA) in the first formal analysis of SRP (specifically, Version 3). SRP is a widely deployed Password Authenticated Key Exchange (PAKE) protocol used in 1Password, iCloud Keychain, and other products. As with many PAKE protocols, two participants use knowledge of a pr… ▽ More

    Submitted 16 March, 2020; originally announced March 2020.

  3. arXiv:1804.05713  [pdf, other

    cs.CR

    Enrich-by-need Protocol Analysis for Diffie-Hellman (Extended Version)

    Authors: Moses D. Liskov, Joshua D. Guttman, John D. Ramsdell, Paul D. Rowe, F. Javier Thayer

    Abstract: Enrich-by-need protocol analysis is a style of symbolic protocol analysis that characterizes all executions of a protocol that extend a given scenario. In effect, it computes a strongest security goal the protocol achieves in that scenario. CPSA, a Cryptographic Protocol Shapes Analyzer, implements enrich-by-need protocol analysis. In this paper, we describe how to analyze protocols using the Di… ▽ More

    Submitted 16 April, 2018; originally announced April 2018.

    Comments: 53 pages

  4. Formal Support for Standardizing Protocols with State

    Authors: Joshua D. Guttman, Moses D. Liskov, John D. Ramsdell, Paul D. Rowe

    Abstract: Many cryptographic protocols are designed to achieve their goals using only messages passed over an open network. Numerous tools, based on well-understood foundations, exist for the design and analysis of protocols that rely purely on message passing. However, these tools encounter difficulties when faced with protocols that rely on non-local, mutable state to coordinate several local sessions.… ▽ More

    Submitted 24 September, 2015; originally announced September 2015.