Citations
14 | Finding counterexamples to inductive conjectures and discovering security protocol attacks.
- Steel, Bundy, et al.
- 2002
(Show Context)
Citation Context ...RAL, we were able to discover 6 previously unknown attacks on 3 different group protocols, making CORAL the leading tool in this area. Work on the CORAL project lead to several research publications, =-=[3, 8, 2, 6, 7, 4, 5]-=-. In future, we hope to have a student project to develop the ability of CORAL to verify correct protocols, as well as find attacks. Recent and ongoing research has moved to the area of APIs. In parti... |
13 | Attacking group protocols by refuting incorrect inductive conjectures
- Bundy, Steel
- 2005
(Show Context)
Citation Context ...RAL, we were able to discover 6 previously unknown attacks on 3 different group protocols, making CORAL the leading tool in this area. Work on the CORAL project lead to several research publications, =-=[3, 8, 2, 6, 7, 4, 5]-=-. In future, we hope to have a student project to develop the ability of CORAL to verify correct protocols, as well as find attacks. Recent and ongoing research has moved to the area of APIs. In parti... |
10 | Attacking a protocol for group key agreement by refuting incorrect inductive conjectures.
- Steel, Bundy, et al.
- 2004
(Show Context)
Citation Context ...RAL, we were able to discover 6 previously unknown attacks on 3 different group protocols, making CORAL the leading tool in this area. Work on the CORAL project lead to several research publications, =-=[3, 8, 2, 6, 7, 4, 5]-=-. In future, we hope to have a student project to develop the ability of CORAL to verify correct protocols, as well as find attacks. Recent and ongoing research has moved to the area of APIs. In parti... |
9 | Attacking group multicast key management protocols using CORAL.
- Steel, Bundy
- 2004
(Show Context)
Citation Context ...RAL, we were able to discover 6 previously unknown attacks on 3 different group protocols, making CORAL the leading tool in this area. Work on the CORAL project lead to several research publications, =-=[3, 8, 2, 6, 7, 4, 5]-=-. In future, we hope to have a student project to develop the ability of CORAL to verify correct protocols, as well as find attacks. Recent and ongoing research has moved to the area of APIs. In parti... |
6 | Attacking the Asokan-Ginzboorg protocol for key distribution in an ad-hoc Bluetooth network using CORAL,’ to appear
- STEEL, BUNDY, et al.
(Show Context)
Citation Context ...RAL, we were able to discover 6 previously unknown attacks on 3 different group protocols, making CORAL the leading tool in this area. Work on the CORAL project lead to several research publications, =-=[3, 8, 2, 6, 7, 4, 5]-=-. In future, we hope to have a student project to develop the ability of CORAL to verify correct protocols, as well as find attacks. Recent and ongoing research has moved to the area of APIs. In parti... |
2 | Automated deduction with XOR constraints
- Steel
- 2005
(Show Context)
Citation Context ...ctively in a first-order model, using constraints. The XOR operation is used extensively in security APIs, so this was a vital step. Details of this work will appear in this year’s CADE 1conference, =-=[1]-=-. Our approach out-performs previous attempts to use model checking on the same problem. It seems that the symbolic approach of representing terms that must be unified modulo XOR properties produces a... |
2 | Using the CORAL system to discover attacks on security protocols
- Steel, Bundy, et al.
- 2003
(Show Context)
Citation Context ...RAL, we were able to discover 6 previously unknown attacks on 3 different group protocols, making CORAL the leading tool in this area. Work on the CORAL project lead to several research publications, =-=[3, 8, 2, 6, 7, 4, 5]-=-. In future, we hope to have a student project to develop the ability of CORAL to verify correct protocols, as well as find attacks. Recent and ongoing research has moved to the area of APIs. In parti... |