Towards a Theory of Secure Systems
نویسندگان
چکیده
We initiate a program to develop a principled theory of secure systems. Our main technical result is a formal logic for reasoning about a network of shared memory, multi-user systems. The logic is inspired by an existing logic for security protocols. It extends the attacker model and adds shared memory, time, and limited forms of access control. We prove soundness for the proof system in the presence of an attacker who controls the network and has partial control over shared memory on individual machines. We illustrate the use of the logic by proving a relevant security property of a part of the Trusted Computing Group’s remote attestation protocol.
منابع مشابه
Secure Communication in Shotgun Cellular Systems
In this paper, we analyze the secure connectivity in Shotgun cellular systems (SCS: Wireless communication systems with randomly placed base stations) by Poisson intrinsically secure communication graph (IS-graph), i.e., a random graph which describes the connections that are secure over a network. For a base-station in SCS, a degree of secure connections is determined over two channel models: ...
متن کاملTOWARDS THE THEORY OF L-BORNOLOGICAL SPACES
The concept of an $L$-bornology is introduced and the theory of $L$-bornological spacesis being developed. In particular the lattice of all $L$-bornologies on a given set is studied and basic properties ofthe category of $L$-bornological spaces and bounded mappings are investigated.
متن کاملModified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption
In this study, we propose a secure communication scheme based on the synchronization of two identical fractional-order chaotic systems. The fractional-order derivative is in Caputo sense, and for synchronization, we use a robust sliding-mode control scheme. The designed sliding surface is taken simply due to using special technic for fractional-order systems. Also, unlike most manuscripts, the ...
متن کاملEvaluating the potential of cascading failure occurrence due to line outage in power systems by information theory method and radial base functions
In power systems, a connected topology is created to increase reliability and economic performance. Increasing dimensions of power systems on the one hand and the need to continuously monitor power systems for secure operation on the other challenge the evaluation of power system security. In such conditions, due to economic conditions and considering the fast growth of consumers in a power sys...
متن کاملAnti-Synchronization of Complex Chaotic T-System Via Optimal Adaptive Sliding-Mode and Its Application In Secure Communication
In this paper, an optimal adaptive sliding mode controller is proposed for anti-synchronization of two identical hyperchaotic systems. We use hyperchaotic complex T-system for master and slave systems with unknown parameters in the slave system. To construct the optimal adaptive sliding mode controller, first a simple sliding surface is designed. Then, the optimal adaptive sliding mode controll...
متن کاملSecuring low-cost RFID systems: An unconditionally secure approach
In this paper, we explore a new direction towards solving the identity authentication problem in RFID systems. We break the RFID authentication process into two main problems: message authentication and random number generation. For parties equipped with a good source of randomness and a secure cryptographic primitive to authenticate messages, the literature of cryptography is rich with wellstu...
متن کامل