Yongyuth Permpoontanalarp

Learn More
Many model checking methods have been developed and applied to analyze cryptographic protocols. Most of them can analyze only one attack trace of a found attack. In this paper, we propose a very simple but practical model checking methodology for the analysis of cryptographic protocols. Our methodology offers an efficient analysis of all attack traces for(More)
Firewalls offer a protection for private networks against both internal and external attacks. However, configuring firewalls to ensure the protections is a difficult task. The main reason is the lack of methodology to analyze the security of firewall configurations. IP spoofing attack is an attack in which an attacker can impersonate another person towards(More)
In this paper, we present a systematic method to analyze the security of Micalipsilas fair contract signing protocol by using coloured Petri nets (CPN). By using CPN, we found two new attacks in the protocol. Also, we show that Baopsilas improved version of the protocol is secure against known message replay attacks on Micalipsilas protocol and our new(More)
Over the past few years, several different approaches have been proposed to deal with multi-agent autoepistemic reasoning. Despite some limitations, each approach is important in its own right. While Pafikh's approach allows an agent to reason uonmonotonically about other agents' knowledge, it cannot reason about other agents' nonmonotonic reasoning.(More)
Micali proposed a simple and practical optimistic fair exchange protocol, called ECS1, for contract signing. Bao et al. found some message replay attacks in both the original ECS1 and a modified ECS1 where the latter aims to solve an ambiguity in the former. Furthermore, Bao et al. proposed an improved ECS1 which aims to prevent all those attacks. In this(More)
Firewalls offer a protection for private networks against external attacks. However, configuring firewalls correctly is a difficult task. There are two main reasons. One is that the effects of a firewall configuration cannot be easily seen during the configuration time. Another one is the lack of guidance to help configuring firewalls. In this paper, we(More)
The TMN protocol is a secure key exchange protocol for mobile communication system. Its security has been analyzed thoroughly by many approaches, and many attacks have been found. Recently, we have developed a new Coloured Petri Net (CPN) approach to analyze cryptographic protocols, and then applied it to analyze the TMN protocol with the homomorphic(More)