Mikael Buchholtz
Technical University of Denmark
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Mikael Buchholtz.
Journal of Computer Security | 2005
Chiara Bodei; Mikael Buchholtz; Pierpaolo Degano; Flemming Nielson; Hanne Riis Nielson
We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew Secure RPC, Needham-Schroeder asymmetric key. and Beller-Chang-Yacobi MSR.
International School on Foundations of Security Analysis and Design | 2001
Hanne Riis Nielson; Flemming Nielson; Mikael Buchholtz
We show how to use static analysis to provide information about security issues related to mobility. First the syntax and semantics of Mobile Ambients is reviewed and we show how to obtain a so-called 0CFA analysis that can be implemented in polynomial time. Next we consider discretionary access control where we devise Discretionary Ambients, based on Safe Ambients, and we adapt the semantics and 0CFA analysis; to strengthen the analysis we incorporate context-sensitivity to obtain a 1CFA analysis. This paves the way for dealing with mandatory access control where we express both a Bell-LaPadula model for confidentiality as well as a Biba model for integrity. Finally, we use Boxed Ambients as a means for expressing cryptographic key exchange protocols and we adapt the operational semantics and the 0CFA analysis.
International Journal of Information Security | 2004
Mikael Buchholtz; Hanne Riis Nielson; Flemming Nielson
The design of a process calculus for analysing security protocols is governed by three factors: expressing the security protocol in a precise and faithful manner, accommodating the variety of attack scenarios, and utilising the strengths (and limit the weaknesses) of the underlying analysis methodology. We pursue an analysis methodology based on control flow analysis in flow logic style, whose ability to analyse a variety of security protocols we have shown previously [7]. This paper develops a calculus, LySans, which allows for much greater control and clarity in the description of attack scenarios, gives a more flexible format for expressing protocols, and at the same time allows one to circumvent some of the ‘false positives’ arising in [7].
tools and algorithms for construction and analysis of systems | 2004
Flemming Nielson; Hanne Riis Nielson; Hongyan Sun; Mikael Buchholtz; René Rydhof Hansen; Henrik Pilegaard; Helmut Seidl
The Succinct Solver Suite offers two analysis engines for solving data and control flow problems expressed in clausal form in a large fragment of first order logic. The solvers have proved to be useful for a variety of applications including security properties of Java Card byte-code, access control features of Mobile and Discretionary Ambients, and validation of protocol narrations formalised in a suitable process algebra. Both solvers operate over finite domains although they can cope with regular sets of trees by direct encoding of the tree grammars; they differ in fine details about the demands on the universe and the extent to which universal quantification is allowed. A number of transformation strategies, mainly automatic, have been studied aiming on the one hand to increase the efficiency of the solving process, and on the other hand to increase the ease with which users can develop analyses. The results from benchmarking against state-of-the-art solvers are encouraging.
Electronic Notes in Theoretical Computer Science | 2005
Mikael Buchholtz; Stephen Gilmore; Jane Hillston; Flemming Nielson
We present a federated analysis of communication protocols which considers both security properties and timing. These are not entirely independent observations of a protocol; by using timing observations of an executing protocol it is possible to calculate encryption keys which were intended to be secret or to deduce derived information about the nature of the communication even in the presence of unbreakable encryption. Our analysis is based on expressing the protocol as a high-level model and deriving from this process calculus models analysable by the Imperial PEPA Compiler and the LySatool.
formal methods | 2005
Mikael Buchholtz; Stephen Gilmore; Valentin Haenel; Carlo Montangero
We present a software tool platform which facilitates security and performance analysis of systems which starts and ends with UML model descriptions. A UML project is presented to the platform for analysis, formal content is extracted in the form of process calculi descriptions, analysed with the analysers of the calculi, and the results of the analysis are reflected back into a modified version of the input UML model. The design platform supporting the methodology, Choreographer, interoperates with state-of-the-art UML modelling tools. We illustrate the approach with a well known protocol and report on the experience of industrial users who have applied Choreographer in their development work.
GC'04 Proceedings of the 2004 IST/FET international conference on Global Computing | 2004
Mikael Buchholtz; Carlo Montangero; Lara Perrone; Simone Semprini
The DEGAS project aims at enriching standard UML-centred development environments in such a way that the developers of global applications can exploit automated formal analyses with minimal overhead. In this paper, we present For-LySa, an instantiation of the DEGAS approach for authentication analysis, which exploits an existing analysis tool developed for the process calculus LySa. We discuss what information is needed for the analysis, and how to build the UML model of an authentication protocol in such a way that the needed information can be extracted from the model. We then present our prototype implementation and report on some promising results of its use.
Electronic Notes in Theoretical Computer Science | 2002
Mikael Buchholtz; Jacob Kragh Andersen; Hans Henrik Løvengreen
Abstract We present initial work on a timed process algebra that models sharing of processor resources allowing preemption at arbitrary points in time. This enables us to model both the functional and the timely behaviour of concurrent processes executed on a single processor. We give a refinement relation that describes that one process is more deterministic than another. Applications of the model for process scheduling, programming language semantics, and kernel development are outlined.
Electronic Notes in Theoretical Computer Science | 2005
Chiara Bodei; Michele Curti; Pierpaolo Degano; Mikael Buchholtz; Flemming Nielson; Hanne Riis Nielson; Corrado Priami
We use a special operational semantics which drives us in inferring quantitative measures on system describing cryptographic protocols. The transitions of the system carry enhanced labels. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use of possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools.
parallel computing technologies | 2005
Chiara Bodei; Mikael Buchholtz; Michele Curti; Pierpaolo Degano; Flemming Nielson; Hanne Riis Nielson; Corrado Priami
We use an enhanced operational semantics to infer quantitative measures on systems describing cryptographic protocols. System transitions carry enhanced labels. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use of possibly different crypto-systems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools.