Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mikael Buchholtz is active.

Publication


Featured researches published by Mikael Buchholtz.


Journal of Computer Security | 2005

Static validation of security protocols

Chiara Bodei; Mikael Buchholtz; Pierpaolo Degano; Flemming Nielson; Hanne Riis Nielson

We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew Secure RPC, Needham-Schroeder asymmetric key. and Beller-Chang-Yacobi MSR.


International School on Foundations of Security Analysis and Design | 2001

Security for Mobility

Hanne Riis Nielson; Flemming Nielson; Mikael Buchholtz

We show how to use static analysis to provide information about security issues related to mobility. First the syntax and semantics of Mobile Ambients is reviewed and we show how to obtain a so-called 0CFA analysis that can be implemented in polynomial time. Next we consider discretionary access control where we devise Discretionary Ambients, based on Safe Ambients, and we adapt the semantics and 0CFA analysis; to strengthen the analysis we incorporate context-sensitivity to obtain a 1CFA analysis. This paves the way for dealing with mandatory access control where we express both a Bell-LaPadula model for confidentiality as well as a Biba model for integrity. Finally, we use Boxed Ambients as a means for expressing cryptographic key exchange protocols and we adapt the operational semantics and the 0CFA analysis.


International Journal of Information Security | 2004

A calculus for control flow analysis of security protocols

Mikael Buchholtz; Hanne Riis Nielson; Flemming Nielson

The design of a process calculus for analysing security protocols is governed by three factors: expressing the security protocol in a precise and faithful manner, accommodating the variety of attack scenarios, and utilising the strengths (and limit the weaknesses) of the underlying analysis methodology. We pursue an analysis methodology based on control flow analysis in flow logic style, whose ability to analyse a variety of security protocols we have shown previously [7]. This paper develops a calculus, LySans, which allows for much greater control and clarity in the description of attack scenarios, gives a more flexible format for expressing protocols, and at the same time allows one to circumvent some of the ‘false positives’ arising in [7].


tools and algorithms for construction and analysis of systems | 2004

The Succinct Solver Suite

Flemming Nielson; Hanne Riis Nielson; Hongyan Sun; Mikael Buchholtz; René Rydhof Hansen; Henrik Pilegaard; Helmut Seidl

The Succinct Solver Suite offers two analysis engines for solving data and control flow problems expressed in clausal form in a large fragment of first order logic. The solvers have proved to be useful for a variety of applications including security properties of Java Card byte-code, access control features of Mobile and Discretionary Ambients, and validation of protocol narrations formalised in a suitable process algebra. Both solvers operate over finite domains although they can cope with regular sets of trees by direct encoding of the tree grammars; they differ in fine details about the demands on the universe and the extent to which universal quantification is allowed. A number of transformation strategies, mainly automatic, have been studied aiming on the one hand to increase the efficiency of the solving process, and on the other hand to increase the ease with which users can develop analyses. The results from benchmarking against state-of-the-art solvers are encouraging.


Electronic Notes in Theoretical Computer Science | 2005

Securing Statically-verified Communications Protocols Against Timing Attacks

Mikael Buchholtz; Stephen Gilmore; Jane Hillston; Flemming Nielson

We present a federated analysis of communication protocols which considers both security properties and timing. These are not entirely independent observations of a protocol; by using timing observations of an executing protocol it is possible to calculate encryption keys which were intended to be secret or to deduce derived information about the nature of the communication even in the presence of unbreakable encryption. Our analysis is based on expressing the protocol as a high-level model and deriving from this process calculus models analysable by the Imperial PEPA Compiler and the LySatool.


formal methods | 2005

End-to-end integrated security and performance analysis on the DEGAS choreographer platform

Mikael Buchholtz; Stephen Gilmore; Valentin Haenel; Carlo Montangero

We present a software tool platform which facilitates security and performance analysis of systems which starts and ends with UML model descriptions. A UML project is presented to the platform for analysis, formal content is extracted in the form of process calculi descriptions, analysed with the analysers of the calculi, and the results of the analysis are reflected back into a modified version of the input UML model. The design platform supporting the methodology, Choreographer, interoperates with state-of-the-art UML modelling tools. We illustrate the approach with a well known protocol and report on the experience of industrial users who have applied Choreographer in their development work.


GC'04 Proceedings of the 2004 IST/FET international conference on Global Computing | 2004

For-LySa: UML for Authentication Analysis

Mikael Buchholtz; Carlo Montangero; Lara Perrone; Simone Semprini

The DEGAS project aims at enriching standard UML-centred development environments in such a way that the developers of global applications can exploit automated formal analyses with minimal overhead. In this paper, we present For-LySa, an instantiation of the DEGAS approach for authentication analysis, which exploits an existing analysis tool developed for the process calculus LySa. We discuss what information is needed for the analysis, and how to build the UML model of an authentication protocol in such a way that the needed information can be extracted from the model. We then present our prototype implementation and report on some promising results of its use.


Electronic Notes in Theoretical Computer Science | 2002

Towards a Process Algebra for Shared Processors

Mikael Buchholtz; Jacob Kragh Andersen; Hans Henrik Løvengreen

Abstract We present initial work on a timed process algebra that models sharing of processor resources allowing preemption at arbitrary points in time. This enables us to model both the functional and the timely behaviour of concurrent processes executed on a single processor. We give a refinement relation that describes that one process is more deterministic than another. Applications of the model for process scheduling, programming language semantics, and kernel development are outlined.


Electronic Notes in Theoretical Computer Science | 2005

Performance Evaluation of Security Protocols Specified in LySa

Chiara Bodei; Michele Curti; Pierpaolo Degano; Mikael Buchholtz; Flemming Nielson; Hanne Riis Nielson; Corrado Priami

We use a special operational semantics which drives us in inferring quantitative measures on system describing cryptographic protocols. The transitions of the system carry enhanced labels. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use of possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools.


parallel computing technologies | 2005

On evaluating the performance of security protocols

Chiara Bodei; Mikael Buchholtz; Michele Curti; Pierpaolo Degano; Flemming Nielson; Hanne Riis Nielson; Corrado Priami

We use an enhanced operational semantics to infer quantitative measures on systems describing cryptographic protocols. System transitions carry enhanced labels. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use of possibly different crypto-systems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools.

Collaboration


Dive into the Mikael Buchholtz's collaboration.

Top Co-Authors

Avatar

Flemming Nielson

Technical University of Denmark

View shared research outputs
Top Co-Authors

Avatar

Hanne Riis Nielson

Technical University of Denmark

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jacob Kragh Andersen

Technical University of Denmark

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

H. Riis Nielson

Technical University of Denmark

View shared research outputs
Researchain Logo
Decentralizing Knowledge