Yongyuth Permpoontanalarp

Learn More
In this paper, we present a systematic method to analyze the security of Micalipsilas fair contract signing protocol by using coloured Petri nets (CPN). By using CPN, we found two new attacks in the protocol. Also, we show that Baopsilas improved version of the protocol is secure against known message replay attacks on Micalipsilas protocol and our new(More)
Many model checking methods have been developed and applied to analyze cryptographic protocols. Most of them can analyze only one attack trace of a found attack. In this paper, we propose a very simple but practical model checking methodology for the analysis of cryptographic protocols. Our methodology offers an efficient analysis of all attack traces for(More)
Firewalls offer a protection for private networks against both internal and external attacks. However, configuring firewalls to ensure the protections is a difficult task. The main reason is the lack of methodology to analyze the security of firewall configurations. IP spoofing attack is an attack in which an attacker can impersonate another person towards(More)
Over the past few years, several different approaches have been proposed to deal with multiagent autoepistemic reasoning. Despite some limitations, each approach is important in its own right. While Pafikh’s approach allows an agent to reason uonmonotonically about other agents’ knowledge, it cannot reason about other agents’ nonmonotonic reasoning.(More)
Micali proposed a simple and practical optimistic fair exchange protocol, called ECS1, for contract signing. Bao et al. found some message replay attacks in both the original ECS1 and a modified ECS1 where the latter aims to solve an ambiguity in the former. Furthermore, Bao et al. proposed an improved ECS1 which aims to prevent all those attacks. In this(More)
Firewalls offer a protection for private networks against external attacks. However, configuring firewalls correctly is a difficult task. There are two main reasons. One is that the effects of a firewall configuration cannot be easily seen during the configuration time. Another one is the lack of guidance to help configuring firewalls. In this paper, we(More)
Firewalls offer a protection for private networks against external attacks. However, Configuring firewalls is a difficult task. The reason in that the effects of a firewall configuration cannot be easily seen during the configuration time. As a result, errors and loopholes in firewall configurations, if exist are discovered only after they actually happen(More)
Fair certified email is an email system which employs the fair exchange protocol. All existing approaches to fair certified email achieve the fair exchange property between a single sender and a receiver only. But they do not offer the fair exchange between all senders and a receiver. So, a malicious receiver can deny receiving messages from some senders(More)