Skip to main content

Showing 1–13 of 13 results for author: Meadows, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.20637  [pdf, other

    cs.CR

    Protocol Dialects as Formal Patterns: A Composable Theory of Lingos -- Technical report

    Authors: Víctor García, Santiago Escobar, Catherine Meadows, Jose Meseguer

    Abstract: Protocol dialects are methods for modifying protocols that provide light-weight security, especially against easy attacks that can lead to more serious ones. A lingo is a dialect's key security component by making attackers unable to "speak" the lingo. A lingo's "talk" changes all the time, becoming a moving target for attackers. We present several kinds of lingo transformations and compositions t… ▽ More

    Submitted 30 April, 2025; v1 submitted 29 April, 2025; originally announced April 2025.

  2. arXiv:2405.01809  [pdf, ps, other

    cs.CR cs.LO

    A Logic of Sattestation

    Authors: Aaron D. Jaggard, Paul Syverson, Catherine Meadows

    Abstract: We introduce a logic for reasoning about contextual trust for web addresses, provide a Kripke semantics for it, and prove its soundness under reasonable assumptions about principals' policies. Self-Authenticating Traditional Addresses (SATAs) are valid DNS addresses or URLs that are generally meaningful -- to both humans and web infrastructure -- and contain a commitment to a public key in the a… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

    Comments: 18 pages. Extended version (including proofs) of paper to appear in CSF'24

  3. arXiv:2209.10321  [pdf, other

    cs.LO cs.CR cs.SC

    CryptoSolve: Towards a Tool for the Symbolic Analysis of Cryptographic Algorithms

    Authors: Dalton Chichester, Wei Du, Raymond Kauffman, Hai Lin, Christopher Lynch, Andrew M. Marshall, Catherine A. Meadows, Paliath Narendran, Veena Ravishankar, Luis Rovira, Brandon Rozek

    Abstract: Recently, interest has been emerging in the application of symbolic techniques to the specification and analysis of cryptosystems. These techniques, when accompanied by suitable proofs of soundness/completeness, can be used both to identify insecure cryptosystems and prove sound ones secure. But although a number of such symbolic algorithms have been developed and implemented, they remain scattere… ▽ More

    Submitted 21 September, 2022; originally announced September 2022.

    Comments: In Proceedings GandALF 2022, arXiv:2209.09333

    Journal ref: EPTCS 370, 2022, pp. 147-161

  4. arXiv:2010.13707  [pdf, other

    cs.CR cs.LO

    Protocol Analysis with Time

    Authors: Damián Aparicio-Sánchez, Santiago Escobar, Catherine Meadows, Jose Meseguer, Julia Sapiña

    Abstract: We present a framework suited to the analysis of cryptographic protocols that make use of time in their execution. We provide a process algebra syntax that makes time information available to processes, and a transition semantics that takes account of fundamental properties of time. Additional properties can be added by the user if desirable. This timed protocol framework can be implemented either… ▽ More

    Submitted 26 October, 2020; originally announced October 2020.

  5. arXiv:2005.12969  [pdf

    cs.CR

    A Taxonomy for Dynamic Honeypot Measures of Effectiveness

    Authors: Jason M. Pittman, Kyle Hoffpauir, Nathan Markle, Cameron Meadows

    Abstract: Honeypots are computing systems used to capture unauthorized, often malicious, activity. While honeypots can take on a variety of forms, researchers agree the technology is useful for studying adversary behavior, tools, and techniques. Unfortunately, researchers also agree honeypots are difficult to implement and maintain. A lack of measures of effectiveness compounds the implementation issues spe… ▽ More

    Submitted 26 May, 2020; originally announced May 2020.

    Comments: 10 pages, 4 figures, 2 tables

  6. arXiv:1907.00227  [pdf, ps, other

    cs.CC cs.CR

    On Asymmetric Unification for the Theory of XOR with a Homomorphism

    Authors: Christopher Lynch, Andrew M. Marshall, Catherine Meadows, Paliath Narendran, Veena Ravishankar

    Abstract: Asymmetric unification, or unification with irreducibility constraints, is a newly developed paradigm that arose out of the automated analysis of cryptographic protocols. However, there are still relatively few asymmetric unification algorithms. In this paper we address this lack by exploring the application of automata-based unification methods. We examine the theory of xor with a homomorphism, A… ▽ More

    Submitted 29 June, 2019; originally announced July 2019.

  7. arXiv:1904.09946  [pdf, ps, other

    cs.CR cs.LO cs.PL

    Strand Spaces with Choice via a Process Algebra Semantics

    Authors: Fan Yang, Santiago Escobar, Catherine Meadows, José Meseguer

    Abstract: Roles in cryptographic protocols do not always have a linear execution, but may include choice points causing the protocol to continue along different paths. In this paper we address the problem of representing choice in the strand space model of cryptographic protocols, particularly as it is used in the Maude-NPA cryptographic protocol analysis tool. To achieve this goal, we develop and give form… ▽ More

    Submitted 22 April, 2019; originally announced April 2019.

  8. arXiv:1806.07209  [pdf, other

    cs.CR

    Formal verification of the YubiKey and YubiHSM APIs in Maude-NPA

    Authors: Antonio González-Burgueño, Damián Aparicio, Santiago Escobar, Catherine Meadows, José Meseguer

    Abstract: In this paper, we perform an automated analysis of two devices developed by Yubico: YubiKey, designed to authenticate a user to network-based services, and YubiHSM, Yubicos hardware security module. Both are analyzed using the Maude-NPA cryptographic protocol analyzer. Although previous work has been done applying automated tools to these devices, to the best of our knowledge there has been no com… ▽ More

    Submitted 19 June, 2018; originally announced June 2018.

  9. arXiv:1603.00087  [pdf, ps, other

    cs.CR cs.LO cs.PL

    Effective Sequential Protocol Composition in Maude-NPA

    Authors: Sonia Santiago, Santiago Escobar, Catherine Meadows, José Meseguer

    Abstract: Protocols do not work alone, but together, one protocol relying on another to provide needed services. Many of the problems in cryptographic protocols arise when such composition is done incorrectly or is not well understood. In this paper we discuss an extension to the Maude-NPA syntax and its operational semantics to support dynamic sequential composition of protocols, so that protocols can be s… ▽ More

    Submitted 29 February, 2016; originally announced March 2016.

  10. On Unification Modulo One-Sided Distributivity: Algorithms, Variants and Asymmetry

    Authors: Andrew M Marshall, Catherine Meadows, Paliath Narendran

    Abstract: An algorithm for unification modulo one-sided distributivity is an early result by Tidén and Arnborg. More recently this theory has been of interest in cryptographic protocol analysis due to the fact that many cryptographic operators satisfy this property. Unfortunately the algorithm presented in the paper, although correct, has recently been shown not to be polynomial time bounded as claimed. In… ▽ More

    Submitted 18 June, 2015; v1 submitted 23 March, 2015; originally announced March 2015.

    Journal ref: Logical Methods in Computer Science, Volume 11, Issue 2 (June 19, 2015) lmcs:1571

  11. arXiv:1106.0706  [pdf, ps, other

    cs.CR cs.CY cs.LO cs.SI

    Actor-network procedures: Modeling multi-factor authentication, device pairing, social interactions

    Authors: Dusko Pavlovic, Catherine Meadows

    Abstract: As computation spreads from computers to networks of computers, and migrates into cyberspace, it ceases to be globally programmable, but it remains programmable indirectly: network computations cannot be controlled, but they can be steered by local constraints on network nodes. The tasks of "programming" global behaviors through local constraints belong to the area of security. The "program partic… ▽ More

    Submitted 29 August, 2011; v1 submitted 3 June, 2011; originally announced June 2011.

    Comments: 32 pages, 12 figures, 3 tables; journal submission; extended references, added discussion

    ACM Class: D.4.6; D.4.4; K.6.5; K.4.2

  12. arXiv:1105.5282  [pdf, other

    cs.CR cs.LO

    State Space Reduction in the Maude-NRL Protocol Analyzer

    Authors: Santiago Escobar, Catherine Meadows, Jose Meseguer

    Abstract: The Maude-NRL Protocol Analyzer (Maude-NPA) is a tool and inference system for reasoning about the security of cryptographic protocols in which the cryptosystems satisfy different equational properties. It both extends and provides a formal framework for the original NRL Protocol Analyzer, which supported equational reasoning in a more limited way. Maude-NPA supports a wide variety of algebraic pr… ▽ More

    Submitted 26 May, 2011; originally announced May 2011.

  13. arXiv:0910.5745  [pdf, ps, other

    cs.CR

    Quantifying pervasive authentication: the case of the Hancke-Kuhn protocol

    Authors: Dusko Pavlovic, Catherine Meadows

    Abstract: As mobile devices pervade physical space, the familiar authentication patterns are becoming insufficient: besides entity authentication, many applications require, e.g., location authentication. Many interesting protocols have been proposed and implemented to provide such strengthened forms of authentication, but there are very few proofs that such protocols satisfy the required security propertie… ▽ More

    Submitted 14 July, 2010; v1 submitted 29 October, 2009; originally announced October 2009.

    Comments: 31 pages, 2 figures; short version of this paper appeared in the Proceedings of MFPS 2010

    ACM Class: D.4.6; C.2.1; C.2.2; K.6.5; D.2.4