Please use this identifier to cite or link to this item: https://www.um.edu.mt/library/oar/handle/123456789/91852
Title: Applying runtime verification to group key establishment
Authors: Colombo, Christian
González Vasco, María Isabel
Vella, Mark Joseph
Zajac, Pavol
Keywords: Aspect-oriented programming
Computer software -- Development
Real-time data processing
Java (Computer program language)
Issue Date: 2019
Publisher: SPS
Citation: Colombo, C., Gonzalez Vasco, M. I., Vella, M., & Zajac, P. (2019). Applying runtime verification to group key establishment. Secure Communication in the Quantum Era (SPS G5448), Slovakia. 1-2
Abstract: Securing communication networks relies fundamentally on the availability of secure cryptographic primitives, which enable authentication, confidentiality, and integrity. A typical starting point to establish secure communication channels is the execution of a protocol that authenticates all involved users/devices and establishes a common secret key among them. This task is referred to as authenticated group key establishment (AGKE). It is standard cryptographic practice to establish provable security guarantees in a suitable theoretical model, abstracting from implementation details. Modeling parties as Turing machines and adversarial capabilities through abstract oracles is a common technique that facilitates a theoretical analysis, but the implementation of a “theoretically secure” protocol may well be susceptible to runtime attacks. A number of authors have explored the use of runtime verification as a means of hardening a security-critical protocol implementation [2, 10, 7, 8]. The aim of this presentation is to give a brief overview of these works.
URI: https://www.um.edu.mt/library/oar/handle/123456789/91852
Appears in Collections:Scholarly Works - FacICTCS

Files in This Item:
File Description SizeFormat 
Applying_runtime_verification_to_group_key_establishment.pdf
  Restricted Access
106.07 kBAdobe PDFView/Open Request a copy


Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.