Skip to main content

Showing 1–4 of 4 results for author: Sasse, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2212.04171  [pdf, ps, other

    cs.CR cs.PL

    Sound Verification of Security Protocols: From Design to Interoperable Implementations (extended version)

    Authors: Linard Arquint, Felix A. Wolf, Joseph Lallemand, Ralf Sasse, Christoph Sprenger, Sven N. Wiesner, David Basin, Peter Müller

    Abstract: We provide a framework consisting of tools and metatheorems for the end-to-end verification of security protocols, which bridges the gap between automated protocol verification and code-level proofs. We automatically translate a Tamarin protocol model into a set of I/O specifications expressed in separation logic. Each such specification describes a protocol role's intended I/O behavior against wh… ▽ More

    Submitted 8 December, 2022; originally announced December 2022.

  2. arXiv:2006.08249  [pdf, other

    cs.CR

    The EMV Standard: Break, Fix, Verify

    Authors: David Basin, Ralf Sasse, Jorge Toro-Pozo

    Abstract: EMV is the international protocol standard for smartcard payment and is used in over 9 billion cards worldwide. Despite the standard's advertised security, various issues have been previously uncovered, deriving from logical flaws that are hard to spot in EMV's lengthy and complex specification, running over 2,000 pages. We formalize a comprehensive symbolic model of EMV in Tamarin, a state-of-the… ▽ More

    Submitted 17 February, 2021; v1 submitted 15 June, 2020; originally announced June 2020.

    Comments: Accepted for IEEE S&P 2021

  3. SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust

    Authors: Laurent Chuat, AbdelRahman Abdou, Ralf Sasse, Christoph Sprenger, David Basin, Adrian Perrig

    Abstract: The ability to quickly revoke a compromised key is critical to the security of any public-key infrastructure. Regrettably, most traditional certificate revocation schemes suffer from latency, availability, or privacy problems. These problems are exacerbated by the lack of a native delegation mechanism in TLS, which increasingly leads domain owners to engage in dangerous practices such as sharing t… ▽ More

    Submitted 20 April, 2020; v1 submitted 25 June, 2019; originally announced June 2019.

    Comments: IEEE European Symposium on Security and Privacy (EuroS&P) 2020

  4. A Formal Analysis of 5G Authentication

    Authors: David Basin, Jannik Dreier, Lucca Hirschi, Saša Radomirović, Ralf Sasse, Vincent Stettler

    Abstract: Mobile communication networks connect much of the world's population. The security of users' calls, SMSs, and mobile data depends on the guarantees provided by the Authenticated Key Exchange protocols used. For the next-generation network (5G), the 3GPP group has standardized the 5G AKA protocol for this purpose. We provide the first comprehensive formal model of a protocol from the AKA family: 5G… ▽ More

    Submitted 10 January, 2020; v1 submitted 27 June, 2018; originally announced June 2018.

    Comments: Categories (ACM class 2012): Security and privacy - Formal methods and theory of security -- Security requirements -- Formal security models -- Logic and verification; Network protocols - Protocol correctness -- Formal specifications; Security and privacy - Network security -- Mobile and wireless security - Security services -- Privacy-preserving protocols

    Report number: Accepted at CCS'18 ACM Class: D.4.6; D.2.4; C.2.2