30/04/2010, 15:00 — 16:00 — Room P4.35, Mathematics Building
Mark Ryan, University of Birmingham
Election Verifiability in Trustworthy Voting Systems
Electronic voting presents a challenging set of requirements,
including verifiability of the result, and incoercibility of the
voters. I will review some of the main ideas in the last decade.
The body of the talk will focus on my work on formalising the idea
of result verifiability. We distinguish three aspects, and use the
applied pi calculus to define them. We show how those aspects can
be evaluated for a range of election systems in the literature.
Election verifiability intuitively appears to conflict with
incoercibility; we show that our definition is compatible with our
previous definition of coercion resistance and exhibit some systems
that satisfy both. Joint work with Steve Kremer and Ben Smyth.
Note the exceptional time and location.
26/02/2010, 16:15 — 17:15 — Room P3.10, Mathematics Building
Cas Cremers, ETH Zurich
Modeling and Analyzing Security in the Presence of Compromising
Adversaries
We present a framework for modeling adversaries in security
protocol analysis, in which we define a hierarchy of adversary
models. These models range from a Dolev-Yao style adversary to more
powerful adversaries who can reveal different parts of principals'
states during protocol execution. Our adversary models unify and
generalize many existing security notions from both the
computational and symbolic settings and lead to new, previously
unexplored security notions. We extend an existing symbolic
protocol-verification tool with our adversary models. This is the
first tool that systematically supports notions such as weak
perfect forward secrecy, key compromise impersonation, and
adversaries capable of state-reveal queries. In extensive case
studies, we automatically find new attacks and rediscover known
attacks that previously required detailed manual analysis. Joint
work with David Basin.
25/02/2010, 18:00 — 19:00 — Room P4.35, Mathematics Building
Frank Pfenning, Carnegie Mellon University
Reasoning about the Consequences of Authorization PoliciesinaLinear
Epistemic Logic
Authorization policies are not stand-alone objects: they are used
to selectively permit actions that change the state of a system.
Thus, it is desirable to have a framework for reasoning about the
semantic consequences of policies. To this end, we extend a
rewriting interpretation of linear logic with connectives for
modeling affirmation, knowledge, and possession. To cleanly confine
semantic effects to the rewrite sequence, we introduce a monad. The
result is a richly expressive logic that elegantly integrates
policies and their effects. After presenting this logic and its
metatheory, we demonstrate its utility by proving properties that
relate a simple file system's policies to their semantic
consequences. This talk represents joint work with Henry DeYoung.
Note exceptional week day, time and location. Joint session with the Logic and Computation Seminar.
04/12/2009, 16:15 — 17:15 — Room P3.10, Mathematics Building
João Rasga, SQIG - IT / IST - TULisbon
A categorical view on quantifier-elimination - Part II
In the sequel of the talk of Cristina Sernadas we proceed by recognizing that, in some cases, a minimal model extending another can be obtained by iterating a certain construction, like for instance in the context of algebraically closed fields with the Artin's construction. We provide conditions that guarantee the existence of a -limit functor identifying such an extension, when the theories are in . The conditions are over the base functor and not the limit functor. The results are illustrated by showing that the theory of ACFs enjoy quantifier elimination. Joint work with Cristina Sernadas.
06/11/2009, 16:15 — 17:15 — Room P3.10, Mathematics Building
Michal Walicki, Institute of Informatics, U Bergen, Norway
Sequence Logic - a Flexible Tool for Analysis of (Epistemic)
Protocols
I give an overview of sequence logic, SL, which allows one to
model and reason about agents which
- are equipped with arbitrary internal logics and
- can interact over linear time.
Changing the agents’ logic or the model of time can affect
correctness of a protocol. Using simple examples, I show how this
can be analysed in SL.
09/10/2009, 15:00 — 16:00 — Room P3.10, Mathematics Building
Ran Canetti, Tel Aviv University
How to Assert and Use Composable Security
In our increasingly on-line world, sophisticated cryptographic
protocols are becoming an integral part of the fabric of society.
Consequently, it is imperative to be able to rigorously specify and assert
the security properties of such protocols. Still, this task has been
frustratingly elusive. One main source of difficulty is that security
properties of protocols are very sensitive to the specific execution
environment, and in particular to the other protocols running in the same
system.
This talk presents a paradigm for specifying and asserting composable
security properties of protocols. These are properties that remain intact
regardless of the other protocols running in the system. We review a number
of advantages of this approach, including an application that allows to
analyze the security of systems with unbounded number of protocol
instances, in an efficient and fully automated way.
06/10/2009, 16:15 — 17:15 — Room P4.35, Mathematics Building
Bruno Montalto, ETH Zurich, Switzerland
Deciding Security Against Offline Guessing Attacks under Equational
Theories
Offline guessing (or dictionary) attacks are one of the most common
vulnerabilities of security protocols. Previous formalizations of
offline guessing attacks are essentially extensions of the standard
Dolev-Yao model for security protocol analysis with inference rules
which model the attacker's guessing capability, such as those
proposed by Lowe. However, as pointed out by Vigano et. al., such a
set of rules is specialized to a particular set of cryptographic
primitives and intruder capabilities, and it is difficult to
convince oneself of its completeness. In line with this work, we
propose a symbolic method based on equational theories and provide
a simple yet general definition of offline guessing attack in our
model. We also show that, for a particular but relevant class of
equational theories, the problem of deciding whether an attacker
can mount an offline guessing attack from a set of terms learned
during protocol execution is decidable in polynomial-time,
mimicking a result by Delaune and Jacquemard for Lowe's model.
24/07/2009, 16:15 — 17:15 — Room P3.10, Mathematics Building
Ana Matos, IST and SQIG-IT
Flow Policy Awareness for Distributed Mobile Code
In the context of global computing, information flow security must
deal with the decentralized nature of security policies. This issue
is particularly challenging when programs are given the flexibility
to perform declassifying instructions. In this talk I point out
potential unwanted behaviors that can arise in a context where such
programs can migrate between computation domains with different
security policies. I will then propose programming language
techniques, for which soundness can be proven at the global
computation level, in order to tackle such unwanted behaviors.
17/07/2009, 16:15 — 17:15 — Room P3.10, Mathematics Building
Rajagopal Nagarajan, Warwick University, UK
Modelling and Analysis of Quantum Protocols
The novel field of quantum computing and quantum information has
gathered significant impetus in the last few years, and it has the
potential to radically impact the future of information technology.
While the successful construction of a large-scale quantum computer
may be some years away, secure communication involving quantum
cryptography has already been implemented, and equipment for
quantum cryptography is commercially available. The major selling
point of quantum cryptography is unconditional security. But can
this be guaranteed in practice? Even when protocols have been
mathematically proved to be secure, it is notoriously difficult to
achieve robust and reliable implementations of secure systems.
Techniques based on formal verification are now widely used by
industry to ensure that (classical) systems meet their
specifications. In this talk, I will give an overview of our
ongoing work in using such techniques for the modelling and
analysis of quantum protocols and, eventually, their
implementations. Joint work with Simon Gay and Nick Papanikolaou.
10/07/2009, 16:15 — 17:15 — Room P3.10, Mathematics Building
Luca Viganò, Università di Verona, Italy
Verifying the Interplay of Authorization Policies and Workflow in
Service-Oriented Architectures
A widespread design approach in distributed applications based on
the service-oriented paradigm, such as web-services, consists of
clearly separating the enforcement of authorization policies and
the workflow of the applications, so that the interplay between the
policy level and the workflow level is abstracted away. While such
an approach is attractive because it is quite simple and permits
one to reason about crucial properties of the policies under
consideration, it does not provide the right level of abstraction
to specify and reason about the way the workflow may interfere with
the policies, and vice versa. For example, the creation of a
certificate as a side effect of a workflow operation may enable a
policy rule to fire and grant access to a certain resource; without
executing the operation, the policy rule should remain inactive.
Similarly, policy queries may be used as guards for workflow
transitions. In this talk, we present a two-level formal
verification framework to overcome these problems and formally
reason about the interplay of authorization policies and workflow
in service-oriented architectures. This allows us to define and
investigate some verification problems for SO applications and give
sufficient conditions for their decidability. This is joint work
with Michele Barletta and Silvio Ranise.
08/07/2009, 16:15 — 17:15 — Room P3.10, Mathematics Building
Virgil D. Gligor, Carnegie Mellon University
Brief Encounters on a Random Key Graph
The notion of the random key graph (now, a.k.a “uniform
random intersection graph”) was defined for probabilistic key
pre-distribution in wireless sensor networks. Recently, these
graphs have been used for a variety of applications, such as
recommender systems using global filtering and clustering analysis.
While random key graphs are not Erdös-Renyi random graphs (e.g.,
the probabilities that graph edges exist are not independent of
each other), they have similar connectivity properties under the
assumption of “full visibility”; i.e., they obey a
similar “zero-one” law as Erdös-Renyi graphs for some
scaling of their parameters, whenever each node is within
communication range of other nodes. In this presentation we explore
various applications of random key graphs ranging from mobile
networks, to trust establishment, to social networks. This is joint
work with Haowen Chan and Adrian Perrig.
25/06/2009, 16:15 — 17:15 — Room P3.10, Mathematics Building
Gabriel Maciá Fernández, University of Granada
Hacking the Network: Techniques and Trends
Network hacking is a growing as a nightmare for security engineers.
Apart from the traditional single machine hacking, attackers use
the network in a distributed way to both carry out and hide their
attacks. In this talk, an overview of current network hacking
techniques and trends is given. Some cases of study will be
explained and discussed. Finally, defense techniques are also
highlighted.
Note the exceptional date. This seminar will be held in the Alameda campus!
19/06/2009, 16:15 — 17:15 — Room P3.10, Mathematics Building
Yusuke Kawamoto, School of Information Science and Technology, University of Tokyo
Computational Soundness of Observational Equivalence without
Requiring Computable Parsing
There are two main approaches to the analysis of security
protocols. The first is a computational approach: a message is a
bit string, an attacker is modeled as a probabilistic
polynomial-time interactive Turing machine, and security properties
are defined as an indistinguishability game. The analysis of
protocols in this approach is based on computational complexity
theory and takes account of the probability that the attacker
breaks the security of cryptographic primitives. The second is a
symbolic approach: a message is abstracted into a symbolic
expression, an attacker is a symbolic process, and security
properties, such as anonymity, can be expressed by the
observational equivalence of processes. The analysis in this
approach assumes ideally secure cryptographic primitives and is
simple to automate. Starting with the seminal work of Abadi and
Rogaway, there have been several results showing the computational
soundness of the symbolic approach: security proofs in the symbolic
approach imply strong security guarantees based on computational
complexity theory. We extend Comon-Lundh and Cortier's recent work
to show the computational soundness of the applied pi-calculus for
a public-key encryption scheme and a ring signature scheme in the
presence of active adversaries: the observational equivalence
between two processes in the applied pi-calculus implies the
computational indistinguishability between the computational
executions of the two processes. Our proof for computational
soundness is different from all existing studies in that it does
not use a computable parsing function from bitstrings to terms.
With the primitives that are considered here, it would not be a big
additional hypothesis to assume such a parsing function. However,
conceptually, this yields different proofs, which may allow us to
obtain other soundness results such as XOR or hashing, while such
proofs could not be conducted in a simulatability framework called
the BPW model.
This seminar will be held in the Alameda campus!
22/05/2009, 16:15 — 17:15 — Room P3.10, Mathematics Building
Paulo Mateus, IST and SQIG-IT
Reducing the Factorization of a Blum Integer to
theIntegrationofaHighly Oscillatory Function
We reduce the problem of factoring a Blum integer to the problem of
(numerically) integrating a certain meromorphic function. We
provide two algorithms to address this problem, one based on the
residue theorem and the other in the (generalized) Cauchy's
argument principle. In the former algorithm, we show that computing
the residue of the function at a certain pole leads to obtain the
factors of a Blum integer. In the latter, we consider a contour
integral that simplifies to an integral over the real numbers for
which we are able to obtain an analytical solution with several
branches. The computational hardness amounts to discovering the
branch of the solution that gives the precise integral. Joint on
going work with Vitor Rocha Vieira.
This seminar will be held in the Alameda campus!
20/02/2009, 16:15 — 17:15 — Room P3.10, Mathematics Building
Manuel Bernardo Barbosa, Universidade do Minho
Security Analysis of Standard Authentication and Key Agreement
Protocols Utilising Timestamps
We propose a generic modelling technique that can be used to extend
existing frameworks for the theoretical security analysis of
cryptographic protocols in order to formally capture the use of
timestamps. For concreteness, we apply this technique to two of the
most popular models adopted in literature: the family of models
stemming from the work of Bellare and Rogaway (BR) and the model
proposed by Canetti and Krawczyk (CK). We analyse previous results
obtained using these models in light of the proposed extensions,
and demonstrate their application to a new class of protocols. In
the timed CK model we concentrate on modular design and analysis of
protocols. We show that the original authenticated and
unauthenticated models are not made redundant by their timed
variants: one can still use them to analyse time-independent
protocols, and the results naturally carry over to the timed
models. Moreover, we propose a more efficient timed authenticator
relying on timestamps. The structure of this new authenticator and
the security proof we provide imply that a signature-based
unilateral authentication mechanism standardised in ISO-9798 is
secure for message authentication. Finally, we use our timed
extension to the BR model to establish the security of an efficient
ISO protocol for key transport and unilateral entity
authentication, for which no proof of security was previously
available.
This seminar will be held in the Alameda campus!
23/01/2009, 16:15 — 17:15 — Room P3.10, Mathematics Building
Luca Viganò, Università di Verona, Italy
Secure Pseudonymous Channels
In recent years, a number of works have appeared that provide
formal definitions of the notion of channel and how different kinds
of channels (e.g. authentic, confidential, secure) can be employed
in security protocols and web services as a means of securing the
communication. In this talk, I will present work that allows us to
specify the properties of message exchanges over different kinds of
channels, either as an assumption or as a goal, and where
communicating agents can use their real names or some pseudonyms.
Joint work with Sebastian Moedersheim.
Joint Session with Logic and Computation Seminar
14/11/2008, 16:15 — 17:15 — Room P3.10, Mathematics Building
Gergei Bana, SQIG-IT
Computational Soundness of Symbolic Indistinguishability and Static
Equivalence
In the research of the relationship between the symbolic and the
computational view of cryptography, a recent approach uses static
equivalence from cryptographic pi calculi as a notion of symbolic
indistinguishability. Previous work has shown that this yields the
soundness of natural interpretations of some interesting equational
theories, such as certain cryptographic operations and a theory of
XOR. However, we argue that static equivalence is too coarse to
allow sound interpretations of many natural and useful equational
theories. We illustrate this with several explicit examples in
which static equivalence fails to work. To fix the problem, we
propose a notion of symbolic indistinguishability that is more
flexible than static equivalence. We provide general results, and
then discuss how this new notion works for the explicit examples
where static equivalence fails to ensure soundness. Joint work with
P. Mohassel and T. Stegers.
Joint Session with Logic and Computation Seminar
28/10/2008, 16:30 — 17:30 — Tagus-1.1
Gustavo Petri, INRIA, Sophia-Antipolis
Relaxed Memory Models: an Operational Approach
Memory models define an interface between programs written in some
language and their implementation, determining which behaviour the
memory (and thus a program) is allowed to have in a given model. A
minimal guarantee memory models should provide to the programmer is
that well-synchronized, that is, data-race free code has a standard
semantics. Traditionally, memory models are defined axiomatically,
setting constraints on the order in which memory operations are
allowed to occur, and the programming language semantics is
implicit as determining some of these constraints. In this work we
propose a new approach to formalizing a memory model in which the
model itself is part of a weak operational semantics for a
(possibly concurrent) programming language. We formalize in this
way a model that allows write operations to the store to be
buffered. This enables us to derive the ordering constraints from
the weak semantics of programs, and to prove, at the programming
language level, that the weak semantics implements the usual
interleaving semantics for data-race free programs, hence in
particular that it implements the usual semantics for sequential
code.
24/10/2008, 16:30 — 17:30 — Room P3.10, Mathematics Building
Tamara Rezk, INRIA, Sophia-Antipolis
A Provably Secure Cryptographic Compiler
It is common knowledge that cryptographic schemes are constructed
to resist attacks guided by malicious attempts to deviate some
intended functionality. However, very little is known about the
level of security that we get by using cryptographic schemes in
different environments, since security depends on the strength of
the adversary. How much can we assume about an unknown adversary
without compromising security? On one hand, many works that aim at
proving that programs which use cryptography are secure assume
specific strategies that the adversary may or may not use when
attacking the system. Unfortunately, experience shows that
limitations to the power of the adversary are not always realistic.
On the other hand, the area of provable or computational
cryptography that started to develop since the early 90s proposes
that the only assumptions on the adversary that can be justified
are his/her computational abilities. Reasoning with arbitrary
adversaries involves the handling of polynomial and probabilistic
hypotheses on complex programs. Can we let the programmer specify
security policies at an abstract level and let the compiler
implement them using provable cryptography? This talk will describe
work in progress with Cedric Fournet and Gurvan Le Guernic on
programming language abstractions for provable cryptography, and a
compiler that implements it. A preliminary result of this work
appeared in POPL'08.
This seminar will be held in the Alameda campus!
18/07/2008, 16:30 — 17:30 — Room P3.10, Mathematics Building
Luca Viganò, Università di Verona
Formal Analysis of a SAML Web Browser Single Sign-On Protocol
Single-Sign-On (SSO) protocols enable companies to establish a
federated environment in which clients sign in the system once and
yet are able to access to services offered by different companies.
The Security Assertion Markup Language (SAML) Web Browser SSO
Profile is the emerging standard in this context. In this paper, we
provide formal models of the protocol corresponding to one of the
most used use case scenario (the SP-Initiated SSO with
Redirect/POST Bindings) and of the implementation used by
SAML-based SSO for Google Applications. In the context of the
AVANTSSAR project, we have techanically analysed these formal
models with SATMC, a state-of-the-art model checker for security
protocols. SATMC has revealed a severe security flaw in the
Google's implementation that allows a dishonest service provider to
impersonate a user and get unauthorized access to Google
Applications (and viceversa). We have reproduced this attack in an
actual deployment of the SAML-based SSO for Google Applications. To
the best of our knowledge this security flaw of the SAML-based SSO
for Google Applications was previously unknown. This work was
carried out by A. Armando, R. Carbone, L. Compagna, J. Cuellar, L.
Tobarra Abad in the context of the FP7 Project AVANTSSAR
coordinated by L. Viganò
This seminar will be held in the Alameda campus!