High-Fidelity Methods for Security Protocols

Description | People | Publications

Description

The design and security analysis of protocols that use cryptographic primitives is one of the most fundamental and challenging areas of computer security research. This project focuses on three topics: foundations of protocol analysis, automated tools, and application of tools and methods to selected protocols. Foundational work centers on relating and combining two previously separate approaches: logical methods based on symbolic execution of protocols, and computational methods involving probability and polynomial-time. The symbolic approach uses a highly idealized representation of cryptographic primitives and has been a successful basis for automated tools. Conversely, the computational approach yields more insight into the strength and vulnerabilities of protocols, but is difficult to apply and only accessible to a small number of true experts in the field. Building on past success using several automated tools, the project will devise tool-based methods that leverage new scientific foundations.

This is a joint project with John Mitchell (Stanford), Daniele Micciancio (UCSD), and Andre Scedrov (Univ. of Pennsylvania). It is supported by the NSF grant CNS-0509033 (Oct 1, 2004 - Sep 30, 2009).

People (at UT Austin)

Publications (at UT Austin)


Contact: shmat AT cs DOT utexas DOT edu