Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Bill Roscoe is active.

Publication


Featured researches published by Bill Roscoe.


Lecture Notes in Computer Science | 2004

Authentication for Pervasive Computing

Sadie Creese; Michael Goldsmith; Bill Roscoe; Irfan Zakiuddin

Key management is fundamental to communications security, and for security in pervasive computing sound key management is particularly difficult. However, sound key management itself depends critically on sound authentication. In this paper we review current notions of entity authentication and discuss why we believe these notions are unsuitable for the pervasive domain. We then present our views on how notions of authentication should be revised to address the challenges of the pervasive domain, and some of the new research problems that will arise. We end with some brief thoughts on how our revised notions may be implemented and some of the problems that may be encountered.


international workshop on security | 2005

Exploiting empirical engagement in authentication protocol design

Sadie Creese; Michael Goldsmith; Richard Harrison; Bill Roscoe; Paul Whittaker; Irfan Zakiuddin

We develop the theme of an earlier paper [3], namely that security protocols for pervasive computing frequently need to exploit empirical channels and that the latter can be classified by variants of the Dolev-Yao attacker model. We refine this classification of channels and study three protocols in depth: two from our earlier paper and one new one.


formal methods | 2003

Watchdog Transformations for Property-Oriented Model-Checking

Michael Goldsmith; Nick Moffat; Bill Roscoe; Tim Whitworth; Irfan Zakiuddin

We discuss how to transform a CSP refinement, \(S \sqsubseteq I\), to enable all its events to be hidden; this is useful because many of the state space compression functions provided by the model-checker FDR are effective only when events are hidden [1]. In an earlier paper [2] we described a suitable transformation for the case where the refinement is in the traces semantics of CSP. This paper extends the approach to the more difficult case of the stable-failures semantics. In both cases, a watchdog transformation is applied to the specification S, resulting in a watchdog processWDS, which is then composed in parallel with I, or with I in a simple context. The watchdog process monitors I and somehow indicates whether it can behave in a way that is incompatible with refinement of S. All events of the original assertion can be hidden in the transformed assertion. We also discuss the design of compression strategies that try to hide as many events as possible in the component processes of I and WDS, and compress the composition as it is being built up. We describe our implementation of the watchdog transformations and some simple compression strategies.


Archive | 2005

Research directions for trust and security in human−centric computing

Sadie Creese; Michael Goldsmith; Bill Roscoe; Irfan Zakiuddin

Pervasive networks foresee communicating and computing devices embedded throughout our environment. This will cause huge increases in the complexity of network infrastructures and the information services available over them. The challenge of managing information services, while maintaining security and privacy will be great. It is not clear that current security paradigms will map readily into such future environments. This paper outlines the authors’ current position regarding the technical challenges which will need to be addressed in order to make secure pervasive computing environments a reality.


Electronic Notes in Theoretical Computer Science | 2005

Polymorphic Systems with Arrays, 2-Counter Machines and Multiset Rewriting

Ranko Lazić; Thomas Christopher Newcomb; Bill Roscoe

Polymorphic systems with arrays (PSAs) is a general class of nondeterministic reactive systems. A PSA is polymorphic in the sense that it depends on a signature, which consists of a number of type variables, and a number of symbols whose types can be built from the type variables. Some of the state variables of a PSA can be arrays, which are functions from one type to another. We present several new decidability and undecidability results for parameterised control-state reacha- bility problems on subclasses of PSAs.


Electronic Communication of The European Association of Software Science and Technology | 2009

Faster FDR Counterexample Generation Using SAT-Solving

Hristina Palikareva; Joël Ouaknine; Bill Roscoe

With the flourishing development of efficient SAT-solvers, bounded model checking (BMC) has proven to be an extremely powerful symbolic model checking technique. In this paper, we address the problem of applying BMC to con- current systems involving the interaction of multiple processes running in parallel. We adapt the BMC framework to the context of CSP and FDR yielding bounded refinement checking. Refinement checking reduces to checking for reverse con- tainment of possible behaviours. Therefore, we exploit the SAT-solver to decide bounded language inclusion as opposed to bounded reachability of error states, as in most existing model checkers. We focus on the CSP traces model which is sufficient for verifying safety properties. We present a Boolean encoding of CSP processes resting on FDRs hybrid two-level approach for calculating the operational seman- tics using supercombinators. We describe our bounded refinement-checking algo- rithm which is based on watchdog transformations and incremental SAT-solving. We have implemented a tool, SymFDR, written in C++ which uses FDR as a shared library for manipulating CSP processes and the state-of-the-art SAT-solver Min- iSAT. Experiments indicate that in some cases, especially for complex combinato- rial problems, SymFDR significantly outperforms FDR.


formal methods | 2008

A Representative Function Approach to Symmetry Exploitation for CSP Refinement Checking

Nick Moffat; Michael Goldsmith; Bill Roscoe

Effective temporal logic model checking algorithms exist that exploit symmetries arising from parallel composition of multiple identical components. These algorithms often employ a function repfrom states to representative states under the symmetries exploited. We adapt this idea to the context of refinement checking for the process algebra CSP. In so doing, we must cope with refinement-style specifications. The main challenge, though, is the need for access to sufficient local information about states to enable definition of a useful repfunction, since compilation of CSP processes to Labelled Transition Systems (LTSs) renders state information a global property instead of a local one. Using a structured form of implementation transition system, we obtain an efficient symmetry exploiting CSP refinement checking algorithm, generalise it in two directions, and demonstrate all three variants on simple examples.


international conference on software engineering | 2018

ReGuard: finding reentrancy bugs in smart contracts

Chao Liu; Han Liu; Zhao Cao; Zhong Chen; Bangdao Chen; Bill Roscoe

Smart contracts enabled a new way to perform cryptocurrency transactions over blockchains. While this emerging technique introduces free-of-con?icts and transparency, smart contract itself is vulnerable. As a special form of computer program, smart contract can hardly get rid of bugs. Even worse, an exploitable security bug can lead to catastrophic consequences, e.g., loss of cryptocurrency/money. In this demo paper, we focus on the most common type of security bugs in smart contracts, i.e., reentrancy bug, which caused the famous DAO attack with a loss of 60 million US dollars. We presented ReGuard, an fuzzing-based analyzer to automatically detect reentrancy bugs in Ethereum smart contracts. Specifically, ReGuard performs fuzz testing on smart contracts by iteratively generating random but diverse transactions. Based on the runtime traces, ReGuard further dynamically identifes reentrancy vulnerabilities. In the preliminary evaluation, we have analyzed 5 existing Ethereum contracts. ReGuard automatically flagged 7 previously unreported reentrancy bugs. A demo video of ReGuard is at https://youtu.be/XxJ3_-cmUiY.


Formal Aspects of Security | 2003

The attacker in ubiquitous computing environments: formalising the threat model

Sadie Creese; Michael Goldsmith; Bill Roscoe


Archive | 2004

Web Services Security: a preliminary study using Casper and FDR

Bill Roscoe

Collaboration


Dive into the Bill Roscoe's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Joël Ouaknine

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge