Reasoning about Physical properties Of security Protocols with an Application To...
Reasoning about Physical properties Of security Protocols with an Application To contactless Systems
The shrinking size of microprocessors as well as the ubiquity of wireless communication have led to the proliferation of portable computing devices with novel security requirements. Whereas traditional security protocols achieve t...
The shrinking size of microprocessors as well as the ubiquity of wireless communication have led to the proliferation of portable computing devices with novel security requirements. Whereas traditional security protocols achieve their security goals relying solely on cryptographic primitives like encryptions and hash functions, the
protocols employed to secure these devices establish and rely in addition on properties of the physical world.
For instance, they may use, as basic building blocks, protocols for ensuring physical proximity, secure
localisation, or secure neighbourhood discovery.
Unfortunately, we often hear about ill-conceived systems, and portable computing devices raise some serious concerns about privacy.To draw meaningful conclusions, the security analysis of these systems has to be done taking into account physical properties, such as transmission delay, network topology, and node positions. This contrasts sharply with
standard models used to analyse traditional protocols.
The main objective of the POPSTAR project is to develop foundations and practical tools to analyse modern security
protocols that establish and rely on physical properties. In particular, we will:
- devise models and develop techniques to make possible a rigorous analysis of cryptographic protocols that establish and
rely on physical properties;
- develop foundations and practical tools for formally verifying security properties, as well as privacy properties that play
a prominent role is many applications;
- experiment the developed techniques for analysing the security of modern contactless systems.
The POPSTAR project will significantly advance the use of formal verification to contribute to the security analysis of protocols that rely on physical properties. This project is bold and ambitious, and answers the forthcoming expectation from consumers and citizens for high level of trust and confidence about contactless nomadic devices.ver más
Seleccionando "Aceptar todas las cookies" acepta el uso de cookies para ayudarnos a brindarle una mejor experiencia de usuario y para analizar el uso del sitio web. Al hacer clic en "Ajustar tus preferencias" puede elegir qué cookies permitir. Solo las cookies esenciales son necesarias para el correcto funcionamiento de nuestro sitio web y no se pueden rechazar.
Cookie settings
Nuestro sitio web almacena cuatro tipos de cookies. En cualquier momento puede elegir qué cookies acepta y cuáles rechaza. Puede obtener más información sobre qué son las cookies y qué tipos de cookies almacenamos en nuestra Política de cookies.
Son necesarias por razones técnicas. Sin ellas, este sitio web podría no funcionar correctamente.
Son necesarias para una funcionalidad específica en el sitio web. Sin ellos, algunas características pueden estar deshabilitadas.
Nos permite analizar el uso del sitio web y mejorar la experiencia del visitante.
Nos permite personalizar su experiencia y enviarle contenido y ofertas relevantes, en este sitio web y en otros sitios web.