Security threats in systems supporting IPv 6 mobility and state-ofthe art security solutions

[1]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[2]  Li Gong,et al.  Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[3]  Pierre Bieber,et al.  A logic of communication in hostile environment , 1990, [1990] Proceedings. The Computer Security Foundations Workshop III.

[4]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[5]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[6]  Mark R. Tuttle,et al.  A Semantics for a Logic of Authentication , 1991, PODC 1991.

[7]  Eli Biham,et al.  Differential Cryptanalysis of the Data Encryption Standard , 1993, Springer New York.

[8]  Mitsuru Matsui,et al.  Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.

[9]  Paul F. Syverson,et al.  On unifying some cryptographic protocol logics , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[10]  Randall J. Atkinson,et al.  IP Encapsulating Security Payload (ESP) , 1995, RFC.

[11]  Volker Kessler,et al.  Formal Semantics for Authentication Logics , 1996, ESORICS.

[12]  D. M. Goldschlag,et al.  Security issues in networks with Internet access , 1997 .

[13]  Dan Harkins,et al.  The Internet Key Exchange (IKE) , 1998, RFC.

[14]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[15]  James P. McDermott,et al.  Attack net penetration testing , 2001, NSPW '00.

[16]  Andrew P. Moore,et al.  Attack Modeling for Information Security and Survivability , 2001 .

[17]  Erland Jonsson,et al.  Different Aspects of Security Problems in Network Operating Systems , 2002 .

[18]  Markus Schumacher,et al.  Collaborative attack modeling , 2002, SAC '02.

[19]  Edwin K. P. Chong,et al.  Efficient multicast stream authentication using erasure codes , 2003, TSEC.

[20]  Salim Hariri,et al.  Impact Analysis of Faults and Attacks in Large-Scale Networks , 2003, IEEE Secur. Priv..

[21]  Birgit Pfitzmann,et al.  A Universally Composable Cryptographic Library , 2003, IACR Cryptol. ePrint Arch..

[22]  Marvin V. Zelkowitz,et al.  Susceptibility matrix: a new aid to software auditing , 2004, IEEE Security & Privacy Magazine.

[23]  Jari Arkko,et al.  Using IPsec to Protect Mobile IPv6 Signaling Between Mobile Nodes and Home Agents , 2004, RFC.

[24]  Shelby Evans,et al.  Risk-based Systems Security Engineering: Stopping Attacks with Intention , 2004, IEEE Secur. Priv..

[25]  Marco Gruteser,et al.  Protecting privacy, in continuous location-tracking applications , 2004, IEEE Security & Privacy Magazine.

[26]  Pekka Nikander,et al.  Effects of mobility and multihoming on transport-protocol security , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[27]  Simon S. Y. Shim,et al.  Issues in high-speed Internet security , 2004, Computer.

[28]  Stuart E. Schechter Toward econometric models of the security risk from remote attacks , 2005, IEEE Security & Privacy.

[29]  Shanshan Song,et al.  Collaborative Internet Worm Containment , 2005, IEEE Secur. Priv..

[30]  Diomidis Spinellis,et al.  Handling and reporting security advisories: a scorecard approach , 2005, IEEE Security & Privacy Magazine.

[31]  Erik Nordmark,et al.  Threats Relating to IPv6 Multihoming Solutions , 2005, RFC.

[32]  David M. Nicol Modeling and Simulation in Security Evaluation , 2005, IEEE Secur. Priv..

[33]  김용성,et al.  Fast Handovers for Mobile IPv6 구현 및 Mobile IPv6 와의 성능 평가 , 2005 .

[34]  D. Richard Kuhn,et al.  Challenges in securing voice over IP , 2005, IEEE Security & Privacy Magazine.

[35]  Gary McGraw,et al.  Knowledge for Software Security , 2005, IEEE Secur. Priv..

[36]  Mehmet Sahinoglu,et al.  Security meter: a practical decision-tree model to quantify risk , 2005, IEEE Security & Privacy Magazine.

[37]  Gerald A. Marin Network Security Basics , 2005, IEEE Secur. Priv..

[38]  Axelle Apvrille,et al.  Secure software development by example , 2005, IEEE Security & Privacy Magazine.

[39]  Helayne T. Ray,et al.  Toward an automated attack model for red teams , 2005, IEEE Security & Privacy Magazine.

[40]  Peter Torr,et al.  Demystifying the threat modeling process , 2005, IEEE Security & Privacy Magazine.

[41]  Richard Ford,et al.  Malcode Mysteries Revealed , 2005, IEEE Secur. Priv..

[42]  Songwu Lu,et al.  Securing a Wireless World , 2006, Proceedings of the IEEE.

[43]  Pekka Nikander,et al.  Host Identity Protocol (HIP) Architecture , 2006, RFC.

[44]  Gerardo Giaretta AAA Goals for Mobile IPv6 , 2006 .

[45]  Dianxiang Xu,et al.  Threat-driven modeling and verification of secure software using aspect-oriented Petri nets , 2006, IEEE Transactions on Software Engineering.

[46]  Xia Wang,et al.  Software fault tree and coloured Petri net-based specification, design and implementation of agent-based intrusion detection systems , 2007, Int. J. Inf. Comput. Secur..

[47]  Francis Dupont,et al.  Mobile IPv6 Operation with IKEv2 and the Revised IPsec Architecture , 2007, RFC.