END2ENDSECURITY

Practical design and analysis of certifiably secure protocols - theory and tools for end-to-end security

 Coordinatore  

Spiacenti, non ci sono informazioni su questo coordinatore. Contattare Fabio per maggiori infomrazioni, grazie.

 Nazionalità Coordinatore Non specificata
 Totale costo 1˙074˙806 €
 EC contributo 1˙074˙806 €
 Programma FP7-IDEAS-ERC
Specific programme: "Ideas" implementing the Seventh Framework Programme of the European Community for research, technological development and demonstration activities (2007 to 2013)
 Code Call ERC-2009-StG
 Funding Scheme ERC
 Anno di inizio 2010
 Periodo (anno-mese-giorno) 2010-02-01   -   2013-10-31

 Partecipanti

# participant  country  role  EC contrib. [€] 
1    UNIVERSITAET DES SAARLANDES

 Organization address address: CAMPUS
city: SAARBRUECKEN
postcode: 66041

contact info
Titolo: Ms.
Nome: Corinna
Cognome: Hahn
Email: send email
Telefono: -95923994
Fax: -95924002

DE (SAARBRUECKEN) hostInstitution 1˙074˙806.90
2    UNIVERSITAET DES SAARLANDES

 Organization address address: CAMPUS
city: SAARBRUECKEN
postcode: 66041

contact info
Titolo: Prof.
Nome: Michael
Cognome: Backes
Email: send email
Telefono: +49 681 302 3249
Fax: -58299

DE (SAARBRUECKEN) hostInstitution 1˙074˙806.90

Mappa


 Word cloud

Esplora la "nuvola delle parole (Word Cloud) per avere un'idea di massima del progetto.

executable    protocol    secure    abstract    devising    analyzing    specifications    tools    protocols    security    techniques    cryptographic    verification    methodology    suitable    vulnerabilities   

 Obiettivo del progetto (Objective)

'State-of-the-art technologies struggle to keep pace with possible security vulnerabilities. The lack of a consistent methodology and tools for analyzing security protocols throughout the various stages of their design hinders the detection and prevention of vulnerabilities and comprehensive protocol analysis. Moreover, state-of-the-art verification tools typically only address particular narrow aspects of a protocol's security and require expert knowledge; hence they do not help protocol designers. The challenge is to guarantee end-to-end security - from high-level specifications of the desired security requirements, to a specification of a security protocol that relies on innovative cryptographic primitives, to a secure, executable program. This proposal addresses key steps of this challenge: our goal is to develop a general methodology for automatically devising security protocols and programs based on high-level specifications of selected security requirements and protocol tasks. This includes developing a user-friendly interface for specifying the protocol's intended behavior and high-level security requirements, devising suitable abstract protocols, selecting suitable cryptographic instantiations, and generating a secure, streamlined implementation. This methodology will also include novel verification techniques that complement all design phases along with a theory which propagates verification results from phase to phase with the ultimate goal of certified end-to-end security. This includes developing type systems for analyzing abstract protocols, a general framework for conducting cryptographic proofs, and techniques for reasoning about executable code. The tools we develop should be automated and usable by non-experts.'

Altri progetti dello stesso programma (FP7-IDEAS-ERC)

RETURN (2013)

RETURN – Rethinking Tunnelling in Urban Neighbourhoods

Read More  

FACEVAR (2013)

Face Recognition: Understanding the role of within-person variability

Read More  

UBICODE (2011)

Decoding the ubiquitin code

Read More