Jun Pang - Academia.edu (original) (raw)

Papers by Jun Pang

Research paper thumbnail of Generalized Unsolicited Tests for Authentication Protocol Analysis

2006 Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06), 2006

Research paper thumbnail of Extending the Strand Space Method to Verify Kerberos V

Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2007), 2007

In this paper, we present two extensions of the strand space method to model Kerberos V. First, w... more In this paper, we present two extensions of the strand space method to model Kerberos V. First, we include time and timestamps to model security protocols with times- tamps: we relate a key to a crack time and combine it with timestamps in order to define a notion of recency. Therefore, we can check replay attacks in this new framework.

Research paper thumbnail of Extending the Strand Space Method with Timestamps: Part I the Theory

Journal of Information Security, 2010

Research paper thumbnail of Formalizing provable anonymity in Isabelle/HOL

Formal Aspects of Computing, 2014

Research paper thumbnail of A Note on K-State Self-stabilization in a Ring with K=N

Nordic Journal of Computing, 2005

We show that, contrary to common belief, Dijkstra's K-state mutual exclusion algorithm on a r... more We show that, contrary to common belief, Dijkstra's K-state mutual exclusion algorithm on a ring also stabilizes when the number K of states per process is one less than the number N+ 1 of processes in the ring. We formalize the algorithm and verify the proof in PVS, based on Qadeer and Shankar's work. We show that K = N

Research paper thumbnail of Formal Analysis of Privacy in an eHealth Protocol

Lecture Notes in Computer Science, 2012

Research paper thumbnail of A Trust-Augmented Voting Scheme for Collaborative Privacy Management

Lecture Notes in Computer Science, 2011

Research paper thumbnail of Design and formal verification of a CEM protocol with transparent TTP

Frontiers of Computer Science, 2013

ABSTRACT In certified email (CEM) protocols, trusted third party (TTP) transparency is an importa... more ABSTRACT In certified email (CEM) protocols, trusted third party (TTP) transparency is an important security requirement which helps to avoid bad publicity as well as protecting individual users’ privacy. Cederquist et al. proposed an optimistic certified email protocol, which employs key chains to reduce the storage requirement of the TTP. We extend their protocol to satisfy the property of TTP transparency, using existing verifiably encrypted signature schemes. An implementation with the scheme based on bilinear pairing makes our extension one of the most efficient CEM protocols satisfying strong fairness, timeliness, and TTP transparency. We formally verify the security requirements of the extended protocol. The properties of fairness, timeliness and effectiveness are checked in the model checker Mocha, and TTP transparency is formalised and analysed using the toolsets µCRL and CADP.

Research paper thumbnail of On Probabilistic Alternating Simulations

IFIP Advances in Information and Communication Technology, 2010

Research paper thumbnail of An Algorithm for Probabilistic Alternating Simulation

Lecture Notes in Computer Science, 2012

Research paper thumbnail of Model-Driven Automatic Generation of Verified BPEL Code for Web Service Composition

2009 16th Asia-Pacific Software Engineering Conference, 2009

Research paper thumbnail of An Inductive Approach to Provable Anonymity

2011 Sixth International Conference on Availability, Reliability and Security, 2011

ABSTRACT We formalise in a theorem prover the notion of provable anonymity proposed by Garcia et ... more ABSTRACT We formalise in a theorem prover the notion of provable anonymity proposed by Garcia et al. Our formalization relies on inductive definitions of message distinguish ability and observational equivalence over observed traces by the intruder. Our theory differs from its original proposal which essentially boils down to the existence of a reinterpretation function. We build our theory in Isabelle/HOL to have a mechanical framework for the analysis of anonymity protocols. Its feasibility is illustrated through the onion routing protocol.

Research paper thumbnail of Verifying a Sliding Window Protocol in μCRL

Lecture Notes in Computer Science, 2004

Research paper thumbnail of Post-hoc User Traceability Analysis in Electronic Toll Pricing Systems

Lecture Notes in Computer Science, 2013

Research paper thumbnail of Exploring dependency for query privacy protection in location-based services

Proceedings of the third ACM conference on Data and application security and privacy - CODASPY '13, 2013

Research paper thumbnail of Constructing and Comparing User Mobility Profiles

ACM Transactions on the Web, 2014

Research paper thumbnail of Measuring query privacy in location-based services

Proceedings of the second ACM conference on Data and Application Security and Privacy - CODASKY '12, 2012

ABSTRACT The popularity of location-based services leads to serious concerns on user privacy. A c... more ABSTRACT The popularity of location-based services leads to serious concerns on user privacy. A common mechanism to protect users' location and query privacy is spatial generalisation. As more user information becomes available with the fast growth of Internet applications, e.g., social networks, attackers have the ability to construct users' personal profiles. This gives rise to new challenges and reconsideration of the existing privacy metrics, such as k-anonymity. In this paper, we propose new metrics to measure users' query privacy taking into account user profiles. Furthermore, we design spatial generalisation algorithms to compute regions satisfying users' privacy requirements expressed in these metrics. By experimental results, our metrics and algorithms are shown to be effective and efficient for practical usage.

Research paper thumbnail of Verifying a sliding window protocol in muCRL

Research paper thumbnail of Distributed Analysis with

Research paper thumbnail of Analyzing an Electronic Cash Protocol Using Applied Pi Calculus

Lecture Notes in Computer Science, 2007

Research paper thumbnail of Generalized Unsolicited Tests for Authentication Protocol Analysis

2006 Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06), 2006

Research paper thumbnail of Extending the Strand Space Method to Verify Kerberos V

Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2007), 2007

In this paper, we present two extensions of the strand space method to model Kerberos V. First, w... more In this paper, we present two extensions of the strand space method to model Kerberos V. First, we include time and timestamps to model security protocols with times- tamps: we relate a key to a crack time and combine it with timestamps in order to define a notion of recency. Therefore, we can check replay attacks in this new framework.

Research paper thumbnail of Extending the Strand Space Method with Timestamps: Part I the Theory

Journal of Information Security, 2010

Research paper thumbnail of Formalizing provable anonymity in Isabelle/HOL

Formal Aspects of Computing, 2014

Research paper thumbnail of A Note on K-State Self-stabilization in a Ring with K=N

Nordic Journal of Computing, 2005

We show that, contrary to common belief, Dijkstra's K-state mutual exclusion algorithm on a r... more We show that, contrary to common belief, Dijkstra's K-state mutual exclusion algorithm on a ring also stabilizes when the number K of states per process is one less than the number N+ 1 of processes in the ring. We formalize the algorithm and verify the proof in PVS, based on Qadeer and Shankar's work. We show that K = N

Research paper thumbnail of Formal Analysis of Privacy in an eHealth Protocol

Lecture Notes in Computer Science, 2012

Research paper thumbnail of A Trust-Augmented Voting Scheme for Collaborative Privacy Management

Lecture Notes in Computer Science, 2011

Research paper thumbnail of Design and formal verification of a CEM protocol with transparent TTP

Frontiers of Computer Science, 2013

ABSTRACT In certified email (CEM) protocols, trusted third party (TTP) transparency is an importa... more ABSTRACT In certified email (CEM) protocols, trusted third party (TTP) transparency is an important security requirement which helps to avoid bad publicity as well as protecting individual users’ privacy. Cederquist et al. proposed an optimistic certified email protocol, which employs key chains to reduce the storage requirement of the TTP. We extend their protocol to satisfy the property of TTP transparency, using existing verifiably encrypted signature schemes. An implementation with the scheme based on bilinear pairing makes our extension one of the most efficient CEM protocols satisfying strong fairness, timeliness, and TTP transparency. We formally verify the security requirements of the extended protocol. The properties of fairness, timeliness and effectiveness are checked in the model checker Mocha, and TTP transparency is formalised and analysed using the toolsets µCRL and CADP.

Research paper thumbnail of On Probabilistic Alternating Simulations

IFIP Advances in Information and Communication Technology, 2010

Research paper thumbnail of An Algorithm for Probabilistic Alternating Simulation

Lecture Notes in Computer Science, 2012

Research paper thumbnail of Model-Driven Automatic Generation of Verified BPEL Code for Web Service Composition

2009 16th Asia-Pacific Software Engineering Conference, 2009

Research paper thumbnail of An Inductive Approach to Provable Anonymity

2011 Sixth International Conference on Availability, Reliability and Security, 2011

ABSTRACT We formalise in a theorem prover the notion of provable anonymity proposed by Garcia et ... more ABSTRACT We formalise in a theorem prover the notion of provable anonymity proposed by Garcia et al. Our formalization relies on inductive definitions of message distinguish ability and observational equivalence over observed traces by the intruder. Our theory differs from its original proposal which essentially boils down to the existence of a reinterpretation function. We build our theory in Isabelle/HOL to have a mechanical framework for the analysis of anonymity protocols. Its feasibility is illustrated through the onion routing protocol.

Research paper thumbnail of Verifying a Sliding Window Protocol in μCRL

Lecture Notes in Computer Science, 2004

Research paper thumbnail of Post-hoc User Traceability Analysis in Electronic Toll Pricing Systems

Lecture Notes in Computer Science, 2013

Research paper thumbnail of Exploring dependency for query privacy protection in location-based services

Proceedings of the third ACM conference on Data and application security and privacy - CODASPY '13, 2013

Research paper thumbnail of Constructing and Comparing User Mobility Profiles

ACM Transactions on the Web, 2014

Research paper thumbnail of Measuring query privacy in location-based services

Proceedings of the second ACM conference on Data and Application Security and Privacy - CODASKY '12, 2012

ABSTRACT The popularity of location-based services leads to serious concerns on user privacy. A c... more ABSTRACT The popularity of location-based services leads to serious concerns on user privacy. A common mechanism to protect users' location and query privacy is spatial generalisation. As more user information becomes available with the fast growth of Internet applications, e.g., social networks, attackers have the ability to construct users' personal profiles. This gives rise to new challenges and reconsideration of the existing privacy metrics, such as k-anonymity. In this paper, we propose new metrics to measure users' query privacy taking into account user profiles. Furthermore, we design spatial generalisation algorithms to compute regions satisfying users' privacy requirements expressed in these metrics. By experimental results, our metrics and algorithms are shown to be effective and efficient for practical usage.

Research paper thumbnail of Verifying a sliding window protocol in muCRL

Research paper thumbnail of Distributed Analysis with

Research paper thumbnail of Analyzing an Electronic Cash Protocol Using Applied Pi Calculus

Lecture Notes in Computer Science, 2007