Nominal/activities/tphols09/basin.html
author Christian Urban <urbanc@in.tum.de>
Thu, 13 Sep 2018 13:09:24 +0100
changeset 539 5eaec0f9980f
parent 415 f1be8028a4a9
permissions -rw-r--r--
updated

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<title>TPHOLs 2009</title>
<script src="http://maps.google.com/maps?file=api&amp;v=2&amp;key=ABQIAAAAPK7aMC4FDjV_GNRHDThC1BTTdYAvEcsK2WWznOVPgLglzb1KQhR1cqhbUMaTXEN7XtSXuQxbViAeQg"
            type="text/javascript"></script>
    <script type="text/javascript">

    function initialize() {
      if (GBrowserIsCompatible()) {
        var map = new GMap2(document.getElementById("map_canvas"));
        var TUM = new GLatLng(48.12954444444, 11.588652777777778);
        map.setCenter(TUM, 0);
        map.setMapType(G_HYBRID_MAP);
        map.addControl(new GSmallMapControl());
        map.addOverlay(new GMarker(TUM));
      }
    }

    </script>
</head>

<BODY TEXT="#000000" 
      BGCOLOR="#4169E1" 
      LINK="#0000EF" 
      VLINK="#51188E" 
      ALINK="#FF0000"
      onload="initialize()" onunload="GUnload()">

<TABLE WIDTH="100%" 
       BGCOLOR="#4169E1" 
       BORDER="0"   
       FRAME="border"  
       CELLPADDING="10"     
       CELLSPACING="2"
       RULES="all">

<!-- left column -->
<TR>
<TD BGCOLOR="#FFFFFF" 
    WIDTH="20%" 
    VALIGN="TOP" 
    ROWSPAN="2">

<p align=center>
<a href="pictures/marienplatz.jpg">
<img src="pictures/marienplatz_small.jpg" alt="Marienplatz" border=0></a>
<br>
<small>Marienplatz (city centre)</small><br>
</p>

<p align=center>
<a href="pictures/englischer_garten.jpg">
<img src="pictures/englischer_garten_small.jpg" alt="Englischer Garten" border=0></a>
<br>
<small>The English Garden</small><br>
</p>

<p align=center>
<a href="pictures/chinesischer_turm.jpg">
<img src="pictures/chinesischer_turm_small.jpg" alt="Chinesischer Turm" border=0></a>
<br>
<small>Chinese Tower (famous beer garden)</small><br>
</p>

<p align=center>
<a href="pictures/cs_building.jpg">
<img src="pictures/cs_building_small.jpg" alt="Computer science building" border=0></a>
<br><small>The Computer Science building of the TUM</small><br>
</p>

<p align=center>
<a href="pictures/magistrale.jpg">
<img src="pictures/magistrale_small.jpg" alt="Main hall of the computer science building" border=0></a>
<br>
<small>The main hall in the CS-building</small><br>
</p>

<p align=center>
<a href="pictures/isar.jpg">
<img src="pictures/isar_small.jpg" alt="The river Isar" border=0></a>
<br>
<small>The Isar river</small><br>
</p>

<p align=center>
<A HREF="pictures/tphols09_poster.jpg">
<IMG ALT="poster" SRC="pictures/tphols09_poster_small.jpg" align="top"></A>
<BR>
<small>The conference poster</small><br>
</p>

</TD>


<!-- right column -->
<TD BGCOLOR="#FFFFFF" WIDTH="75%" VALIGN="TOP">
<H3>SPEAKER: David Basin</H3>

<H3>TITLE:  Let's get physical: models and methods for real-world security  
protocols</H3>

(Joint work with Patrick Schaller, Benedikt Schmidt, and Srdjan Capkun)

<p>
Traditional security protocols are mainly concerned with key establishment and
principal authentication, and rely on predistributed keys and properties of
cryptographic operators. In contrast, new application areas are emerging that
establish and rely on properties of the physical world. Examples include
secure localization, distance bounding, and device pairing protocols.
</p>

<p>
We present a formal model extending standard, inductive, trace-based, symbolic
approaches in two directions. In terms of communication, we refine the
standard Dolev-Yao model to account for network topology, transmission delays,
and node positions. This results in a distributed intruder with restricted,
but more realistic, communication capabilities. On the level of messages, we
use an abstract message theory to establish facts independent of the concrete
protocol and message theory. To analyse the security of a given protocol, we
instantiate the abstract message theory so that properties of the
cryptographic operators under consideration are accurately modeled.  We
describe the formalization of this model in Isabelle/HOL and present its
application to a distance bounding protocol, where the concrete message theory
includes exclusive-or and its associated equational theory.
</p>
</TD>
</TABLE>

<hr>
<!-- Created:  Thu Feb 28 19:21:12 CET 2008 -->
<!-- hhmts start -->
Last modified: Wed Apr 29 19:18:31 CEST 2009
<!-- hhmts end -->
<a href="http://validator.w3.org/check/referer">[Validate this page.]</a>
</body>
</html>