|
J12. |
Gritzalis, D.,
Katsaros,
P., Basagiannis, S., Soupionis, Y.,
Formal analysis
for robust
anti-SPIT
protection using
model-checking,
(To appear in)
International
Journal of
Information
Security,
Springer,
2012
Keywords:
SPam over
Internet
Telephony,
Session
Initiation
Protocol, model
checking,
security
policies |
|
J11. |
Basagiannis, S.,
Petridou, S.,
Alexiou, N.,
Papadimitriou,
G., Katsaros,
P.,
Quantitative
analysis of a
certified e-mail
protocol in
mobile
environments: A
probabilistic
model checking
approach,
Computers
& Security,
Vol. 30 (4), 257-272,
Elsevier,
2011
(online:
http://dx.doi.org/10.1016/j.cose.2011.02.001)
Keywords:
security
protocols,
probabilistic
model checking,
mobile computing |
|
J10. |
Basagiannis, S.,
Katsaros,
P., Pombortsis, A., Synthesis of attack
actions using model checking for the verification of security protocols,
Security and Communication
Networks, Vol. 4 (2), 147-161, John Wiley & Sons, 2011
(online:
http://dx.doi.org/10.1002/sec.119)
Keywords:
security
protocols,
intruder
modeling, model
checking |
|
J7. |
Basagiannis, S.,
Katsaros,
P., Pombortsis, A., An intruder model with Message
Inspection for model checking security protocols,
Computers
& Security, Vol. 29 (1), 16-34,
Elsevier,
2010
(online:
http://dx.doi.org/10.1016/j.cose.2009.08.003)
Keywords:
security
protocols,
verification,
model checking,
intrusion
attacks, formal
analysis |
|
J6. |
Basagiannis, S., Katsaros, P., Pombortsis,
A., Alexiou, N., Probabilistic model checking for the quantification of
DoS security threats, Computers
& Security, Vol. 28 (6), 450-465,
Elsevier,
2009
(online:
http://dx.doi.org/10.1016/j.cose.2009.01.002)
Keywords: denial of service, secure authentication,
probabilistic
model checking,
resource
exhaustion,
attacker model |
|
J5. |
Katsaros, P.,
A roadmap to electronic payment transaction guarantees and a
Colored Petri Net model checking approach,
Information and Software Technology, Vol. 51 (2), 235-257, Elsevier, 2009
(online:
http://dx.doi.org/10.1016/j.infsof.2008.01.005)
Keywords:
electronic
payments,
atomicity, fault
tolerance,
e-commerce
transactions,
security,
Colored
Petri-Nets,
model checking |
|
C39. |
Chatzieleftheriou,
G., Bonakdarpour,
B., Smolka, S.,
Katsaros,
P.
Abstract model
repair, (To
appear in)
Proceedings of the
4th NASA Formal
Methods
Symposium (NFM),
Norfolk,
Virginia,
LNCS 7226, Springer Verlag, 2012
Keywords:
model repair,
abstraction -
refinement |
|
C38. |
Deshpande, T.,
Katsaros, P., Basagiannis, S., Smolka,
S.
Formal analysis of
the DNS
Bandwidth
Amplification
Attack and its
countermeasures
using
probabilistic
model checking,
In
Proceedings of the 13th IEEE International
High Assurance Systems Engineering Symposium (HASE), Boca Raton,
Florida, IEEE Computer Society, 360-367, 2011
Keywords: bandwidth amplification attack, probabilistic
model checking |
|
C33. |
Petridou,
S., Basagiannis,
S., Alexiou, N.,
Papadimitriou,
G., Katsaros,
P. Quantitative model checking of an RSA-based
email protocol
on mobile
devices, In Proceedings of the
16th IEEE
Symposium on
Computers and
Communications
(ISCC),
Corfu,
Greece,
IEEE Computer
Society,
639-645, 2011
(http://dx.doi.org/10.1109/ISCC.2011.5983911)
Keywords:
security
protocols,
probabilistic
model checking,
mobile computing |
|
C32. |
Bartocci,
E., Grosu, R.,
Katsaros,
P.,
Ramakrishnan,
CR, Smolka, S.
Model Repair for
probabilistic
systems, In
Proceedings of the
17th Int.
Conference on
Tools and
Algorithms for
the Construction
and Analysis of
Systems (TACAS),
Saarbrücken,
Germany,
LNCS
6605,
326-340, Springer Verlag, 2011
(online:
http://dx.doi.org/10.1007/978-3-642-19835-9_30)
Keywords:
model repair,
probabilistic
model checking,
nonlinear
programming |
|
C31. |
Soupionis, Y., Basagiannis,
S., Katsaros, P., Gritzalis, D. A formally verified mechanism for
countering SPIT, 5th
International
Workshop on Critical
Information Infrastructure Security (CRITIS'10),
Athens,
Greece,
LNCS 6712,
128-139, Springer Verlag, 2011
Keywords:
Spam over
Internet
Telephony
(SPIT), policy
management,
model checking,
formal
verification,
Voice over IP
(VoIP) |
|
C30. |
Alexiou, N., Deshpande, T.,
Basagiannis, S., Smolka, S., Katsaros, P. Formal analysis of the Kaminsky
DNS cache-poisoning attack using probabilistic model checking, In
Proceedings of the 12th IEEE International
High Assurance Systems Engineering Symposium (HASE), San Jose,
California, IEEE Computer Society,
94-103, 2010
(online:
http://doi.ieeecomputersociety.org/10.1109/HASE.2010.25)
Keywords: cache-poisoning attack, probabilistic
model checking |
|
|
C22. |
Basagiannis,
S., Katsaros, P., Pombortsis, A., Alexiou, N., A
probabilistic attacker model for quantitative verification of DoS security
threats, In Proceedings of the
32nd
Annual IEEE International on Computer Software and Applications Conference
(COMPSAC 2008), Turku, Finland, IEEE Computer Society, 12-19, 2008
(online:
http://doi.ieeecomputersociety.org/10.1109/COMPSAC.2008.48)
Keywords: |
|
C20. |
Basagiannis, S., Katsaros, P.,
Pombortsis, A.,
Intrusion Attack Tactics for
the model checking of e-commerce security guarantees, In Proceedings of the
26th International Conference
on Computer Safety, Reliability and Security (SAFECOMP), Nuremberg, Germany,
LNCS 4680, 238-251, Springer Verlag, 2007
(online:
http://dx.doi.org/10.1007/978-3-540-75101-4_22)
Keywords: |
|
C18. |
Basagiannis, S., Katsaros, P.,
Pombortsis, A.,
Interlocking control by
Distributed Signal Boxes: design and verification with the SPIN model
checker, In
Proceedings of the
International Symposium on
Parallel and Distributed Processing and Applications (ISPA 2006), Sorrento, Italy, LNCS 4330,
317-328, Springer Verlag, 2006
(online:
http://dx.doi.org/10.1007/11946441_32)
Keywords: |
|
C16. |
Katsaros, P., Odontidis, V.,
Gousidou-Koutita, M.,
Simulation and verification of
atomicity properties for an electronic cash system, In Proceedings of the
2005 European Simulation and Modelling Conference (ESM 2005), EUROSIS, Porto,
Portugal, 558-563, 2005
Keywords: |
|
C15. |
Katsaros, P., Odontidis, V.,
Gousidou-Koutita, M.,
Colored Petri Net based model
checking and failure analysis for e-commerce protocols, In Proceedings of the
Sixth Workshop and Tutorial on Practical
Use of Coloured Petri Nets and the CPN Tools (CPN'05), DAIMI PB-576, Dept. of Computer
Science, University of Aarhus, Denmark, 267-283, 2005
Keywords: |
|