2018
DOI: 10.1007/978-3-319-91271-4_13
|View full text |Cite
|
Sign up to set email alerts
|

Clarification of Ambiguity for the Simple Authentication and Security Layer

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…Our modelling of the CAM protocol also allowed us to clarify what was described in the documentation but we focus on different properties as identified by our STRIDE threat analysis of the CAM protocol. Clarification of an informally specified protocol framework using abstract state machines as compared to a concrete implementation was considered in [23].…”
Section: Combining Security and Verificationmentioning
confidence: 99%
See 1 more Smart Citation
“…Our modelling of the CAM protocol also allowed us to clarify what was described in the documentation but we focus on different properties as identified by our STRIDE threat analysis of the CAM protocol. Clarification of an informally specified protocol framework using abstract state machines as compared to a concrete implementation was considered in [23].…”
Section: Combining Security and Verificationmentioning
confidence: 99%
“…8 with respect to when the vehicle should brake. Specifically, we loop through the sequence of received cams (lines 12-30) and if one is found which indicates that the originating vehicle is travelling in the same direction as the current one (line 21), then we brake if the CAM was recent enough or the sensors indicate that we should (lines [23][24][25][26]. This condition was inspired by the identification of a DoS threat so we ensure that, if the received CAM is out of date (potentially due to jamming) then we rely on the physical sensors to indicate when braking should occur.…”
Section: Receiving Camsmentioning
confidence: 99%
“…Security and Privacy. Our previous work on security, using temporal and modal logics [65], has led on to work on security verification and evaluation [66,67]. Recent work has also involved combining informal threat analysis techniques with our formal verification approaches [68,69], allowing formal techniques to be focussed on the areas of highest risk.…”
Section: Transparency and Explainabilitymentioning
confidence: 99%