Security-related publications



Back to book home page

2000

How to Prevent Type Flaw Attacks on Security Protocols.
James Heather, Gavin Lowe, and Steve Schneider,  Proceedings of 13th IEEE Computer Security Foundations Workshop, pages 255-268, 2000. Also available as Department of Mathematics and Computer Science, Technical Report 2000/2, University of Leicester, 2000.
A Unifying Approach to Data-independence
Ranko Lazic and David Nowak, Proceedings of the 11th International Conference on Concurrency Theory (CONCUR 2000), Lecture Notes in Computer Science. Springer-Verlag, August 2000.
Automating Data Independence
Philippa Broadfoot, Gavin Lowe, and Bill Roscoe, Proceedings of European Symposium on Research in Computer Security, 2000.
The successes and failures of behavioural models
Bill Roscoe, Mike Reed, and Richard Forster, In Millenial Perspectives in Computer Science, Davies, Roscoe, and Woodcock (eds), Palgrave, 2000.
May testing, non-interference, and compositionality.
Steve Schneider, First Irish Conference on Mathematical Foundations of Computer Science and Information Technology, 2000.
Analysing Time Dependent Security Properties in CSP using PVS
Neil Evans and Steve Schneider, Proceedings of European Symposium on Research in Computer Security, 2000.
Towards automatic verification of authentication protocols on an unbounded network
James Heather and Steve Schneider, Proceedings of 13th IEEE Computer Security Foundations Workshop, 2000.

1999

Towards a Completeness Result for Model Checking of Security Protocols.
Gavin Lowe,  Journal of Computer Security, Volume 7, Numbers 2, 3, pages 89-146, 1999. Earlier versions appeared in Proceedings of 11th IEEE Computer Security Foundations Workshop, pages 96-105, 1998, and as Department of Mathematics and Computer Science, Technical Report 1998/6, University of Leicester, 1998.
Simplifying Transformations for Security Protocols.
Mei Lin Hui and Gavin Lowe, Proceedings of 12th IEEE Computer Security Foundations Workshop, pages 32-43, 1999. Also available as Department of Mathematics and Computer Science, Technical Report 1999/1, University of Leicester, 1999.
Defining Information Flow.
Gavin Lowe,  Department of Mathematics and Computer Science, Technical Report 1999/3, University of Leicester, 1999.
Analyzing a Library of Security Protocols using Casper and FDR.
Gavin Lowe, Ben Donovan and Paul Norris, Proceedings of the Workshop on Formal Methods and Security Protocols, 1999. Some of the Casper scripts are available here (gzipped, tarred directory).
Data Independence with Generalised Predicate Symbols
Ranko Lazic and Bill Roscoe, Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA '99), June 28 - July 1 1999, Las Vegas, Nevada, USA. Volume I, 319-325. Published by CSREA Press.
Proving security protocols with model checkers by data independence techniques
Bill Roscoe and Philippa Broadfoot, Journal of Computer Security, Special Issue CSFW11, 1999, p 147. Published by IOS Press.
What is intransitive interference?
Bill Roscoe and Michael Goldsmith, Proceedings of 12th IEEE Computer Security Foundations Workshop, 1999.
Proceedings of the DERA/RHUL Workshops on Secure Architectures and Information Flow
Peter Ryan and Steve Schneider, 1999.
Process algebra and non-interference
Peter Ryan and Steve Schneider, Proceedings of 12th IEEE Computer Security Foundations Workshop, 1999.
Non-interference Properties for Nondeterministic Processes
Richard Forster, D.Phil. thesis, Oxford University Computing Laboratory, 1999.
A Semantic Study of Data Independence with Applications to Model Checking
Ranko Lazic, D.Phil. thesis, Oxford University Computing Laboratory, 1999.

1998

Casper: A Compiler for the Analysis of Security Protocols.
Gavin Lowe,  Proceedings of 10th IEEE Computer Security Foundations Workshop, 1997. Also in Journal of Computer Security, Volume 6, pages 53-84, 1998.
Proving security protocols with model checkers by data independence techniques.
Bill Roscoe, Proceedings of 11th IEEE Computer Security Foundations Workshop, 1998.
An attack on a recursive authentication protocol: A cautionary tale.
Peter Ryan and Steve Schneider, Information Processing Letters 65 (1998), 7-10.
Formal Analysis of an Non-Repudiation Protocol
Steve Schneider,  Proceedings of 11th IEEE Computer Security Foundations Workshop, 1998.

1997

A Hierarchy of Authentication Specifications.
Gavin Lowe,  Proceedings of 10th IEEE Computer Security Foundations Workshop, 1997.
Also available as Department of Mathematics and Computer Science Technical Report 1996/33, University of Leicester, 1996.
Using CSP to Detect Errors in the TMN Protocol.
Gavin Lowe and Bill Roscoe, IEEE Transactions on Software Engineering, volume 23, number 10, 1997.
A preliminary version is available as Department of Mathematics and Computer Science Technical Report 1996/34, University of Leicester, 1996.
A Family of Attacks upon Authentication Protocols.
Gavin Lowe,  Department of Mathematics and Computer Science, Technical Report 1997/5, University of Leicester, 1997.
Using a PVS Embedding of CSP to Verify Authentication Protocols.
Bruno Dutertre and Steve Schneider, Proceedings of Theorem Proving in Higher Order Logics (TPHOLs) 1997.
CSP, PVS and a Recursive Authentication Protocol.
Jeremy Bryans and Steve Schneider, Proceedings of DIMACS Workshop on Formal Verification of Security Protocols, 1997.
Verifying Authentication Protocols with CSP.
Steve Schneider,  Proceedings of 10th IEEE Computer Security Foundations Workshop, 1997.

1996

Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR.
Gavin Lowe,  Tools and Algorithms for the Construction and Analysis of Systems, Margaria and Steffen (eds.), volume 1055 of Lecture Notes in Computer Science, Springer Verlag, pages 147-166, 1996.
Also in Software Concepts and Tools, 17:93-102, 1996.
Some New Attacks upon Security Protocols.
Gavin Lowe,   Proceedings of 9th IEEE Computer Security Foundations Workshop, 1996.
Intensional specifications of security protocols
Bill Roscoe,   Proceedings of 9th IEEE Computer Security Foundations Workshop, 1996.
Security Properties and CSP.
Steve Schneider,  Proceedings of IEEE Computer Society Symposium on Security and Privacy, Oakland, 1996.
Using CSP for Protocol Analysis: the Needham-Schroeder Public-Key Protocol
Steve Schneider,  Royal Holloway Technical Report CSD-TR-96-14.
CSP and anonymity
Steve Schneider and Abraham Sidiropoulos, Proceedings of European Symposium on Research in Computer Security, LNCS 1146, 1996.

1995

CSP and determinism in security modelling
Bill Roscoe,  Proceedings of IEEE Computer Society Symposium on Security and Privacy, Oakland, 1995.
Modelling and verifying key-exchange protocols using CSP and FDR
Bill Roscoe,  Proceedings of 8th IEEE Computer Security Foundations Workshop, 1995.

 

 
 
 
 
 

Back to book home page

Last updated by Steve Schneider: November 15, 2000