Stéphane Lafrance et John Mullins
Article de revue (2003)
|
Libre accès au plein texte de ce document Version officielle de l'éditeur Conditions d'utilisation: Tous droits réservés Télécharger (321kB) |
Abstract
Meadows recently proposed a formal cost-based framework for the analysis of denial of service, showing how to formalize some existing principles used to make cryptographic protocols more resistant to denial of service by comparing the cost to the defender against the cost to the attacker. The first contribution of this paper is to introduce a new security property called impassivity designed to capture the ability of a protocol to achieve these goals in the framework of a generic value-passing process algebra called Security Process Algebra ( SPPA) extended with local function calls, cryptographic primitives and special semantic features in order to handle cryptographic protocols. Impassivity is defined as an information flow property founded on bisimulation-based non-deterministic admissible interference. A sound and complete proof method for impassivity is provided. The method extends previous results of the authors on bisimulation-based non-deterministic admissible interference and its application to the analysis of cryptographic protocols. It is illustrated by its application to the TCP/IP protocol.
Mots clés
Sujet(s): |
2700 Technologie de l'information > 2700 Technologie de l'information 2700 Technologie de l'information > 2706 Génie logiciel 2700 Technologie de l'information > 2713 Algorithmes |
---|---|
Département: | Département de génie informatique et génie logiciel |
URL de PolyPublie: | https://publications.polymtl.ca/3381/ |
Titre de la revue: | Journal of Universal Computer Science (vol. 9, no 11) |
Maison d'édition: | J.UCS Consortium |
DOI: | 10.3217/jucs-009-11-1350 |
URL officielle: | https://doi.org/10.3217/jucs-009-11-1350 |
Date du dépôt: | 17 janv. 2019 15:18 |
Dernière modification: | 04 avr. 2025 15:50 |
Citer en APA 7: | Lafrance, S., & Mullins, J. (2003). An information flow method to detect denial of service vulnerabilities. Journal of Universal Computer Science, 9(11), 1350-1369. https://doi.org/10.3217/jucs-009-11-1350 |
---|---|
Statistiques
Total des téléchargements à partir de PolyPublie
Téléchargements par année

Provenance des téléchargements

Dimensions