Skip to main content

Showing 1–5 of 5 results for author: Radomirovic, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2005.03749  [pdf, other

    cs.CR

    Dispute Resolution in Voting

    Authors: David Basin, Sasa Radomirovic, Lara Schmid

    Abstract: In voting, disputes arise when a voter claims that the voting authority is dishonest and did not correctly process his ballot while the authority claims to have followed the protocol. A dispute can be resolved if any third party can unambiguously determine who is right. We systematically characterize all relevant disputes for a generic, practically relevant, class of voting protocols. Based on our… ▽ More

    Submitted 28 May, 2020; v1 submitted 7 May, 2020; originally announced May 2020.

  2. A Formal Analysis of 5G Authentication

    Authors: David Basin, Jannik Dreier, Lucca Hirschi, Saša Radomirović, Ralf Sasse, Vincent Stettler

    Abstract: Mobile communication networks connect much of the world's population. The security of users' calls, SMSs, and mobile data depends on the guarantees provided by the Authenticated Key Exchange protocols used. For the next-generation network (5G), the 3GPP group has standardized the 5G AKA protocol for this purpose. We provide the first comprehensive formal model of a protocol from the AKA family: 5G… ▽ More

    Submitted 10 January, 2020; v1 submitted 27 June, 2018; originally announced June 2018.

    Comments: Categories (ACM class 2012): Security and privacy - Formal methods and theory of security -- Security requirements -- Formal security models -- Logic and verification; Network protocols - Protocol correctness -- Formal specifications; Security and privacy - Network security -- Mobile and wireless security - Security services -- Privacy-preserving protocols

    Report number: Accepted at CCS'18 ACM Class: D.4.6; D.2.4; C.2.2

  3. arXiv:1503.02261  [pdf, other

    cs.CR

    Attack Trees with Sequential Conjunction

    Authors: Ravi Jhawar, Barbara Kordy, Sjouke Mauw, Sasa Radomirovic, Rolando Trujillo-Rasua

    Abstract: We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND attack tree formalism increases the expressivity of attack trees by introducing the sequential conjunctive operator SAND. This operator enables the modeling of ordered events. We give a semantics to SAND attack trees by interpreting them as sets of series-parallel gr… ▽ More

    Submitted 8 March, 2015; originally announced March 2015.

    Comments: This is an extended version of the work published at IFIP SEC 2015

  4. arXiv:1501.03868  [pdf, other

    cs.CR

    Generalizing Multi-party Contract Signing

    Authors: Sjouke Mauw, Sasa Radomirovic

    Abstract: Multi-party contract signing (MPCS) protocols allow a group of signers to exchange signatures on a predefined contract. Previous approaches considered either completely linear protocols or fully parallel broadcasting protocols. We introduce the new class of DAG MPCS protocols which combines parallel and linear execution and allows for parallelism even within a signer role. This generalization is u… ▽ More

    Submitted 17 February, 2015; v1 submitted 15 January, 2015; originally announced January 2015.

    Comments: Extended version of POST 2015 paper

  5. arXiv:cs/0611062  [pdf, ps, other

    cs.CR

    A framework for compositional verification of security protocols

    Authors: Suzana Andova, Cas Cremers, Kristian Gjosteen, Sjouke Mauw, Stig F. Mjolsnes, Sasa Radomirovic

    Abstract: Automatic security protocol analysis is currently feasible only for small protocols. Since larger protocols quite often are composed of many small protocols, compositional analysis is an attractive, but non-trivial approach. We have developed a framework for compositional analysis of a large class of security protocols. The framework is intended to facilitate automatic as well as manual verifi… ▽ More

    Submitted 1 May, 2007; v1 submitted 14 November, 2006; originally announced November 2006.