OXFORD UNIVERSITY  COMPUTING LABORATORY

Publications by Gavin Lowe


(Most recent publications at bottom.)
Probabilities and Priorities in Timed CSP
Gavin Lowe. DPhil thesis, Oxford University, 1993.
Probabilistic and Prioritized Models of Timed CSP
Gavin Lowe. Theoretical Computer Science 138 315-352, 1995. (Special issue on the Mathematical Foundations of Programming Semantics conference, 1992).
Scheduling-Oriented Models for Real-Time Systems
Gavin Lowe. The Computer Journal, volume 38, number 6, 1995.
Refinement of Complex Systems: A Case Study
Gavin Lowe and Hussein Zedan. The Computer Journal, volume 38, number 10, 1995.
A Graphical Calculus.
Sharon Curtis and Gavin Lowe. Mathematics of Program Construction, 1995, Lecture Notes in Computer Science, 947, 1995.
An Attack on the Needham-Schroeder Public-Key Authentication Protocol.
Gavin Lowe. Information Processing Letters, volume 56, number 3, pages 131-133, 1995.
Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR.
Gavin Lowe. In Tools and Algorithms for the Construction and Analysis of Systems, Margaria and Steffen (eds.), volume 1055 of Lecture Notes in Computer Science, Springer Verlag, pages 147-166, 1996.
Also in Software Concepts and Tools, 17:93-102, 1996.
Proofs with Graphs.
Sharon Curtis and Gavin Lowe. Science of Computer Programming, volume 26, 1996.
Some New Attacks upon Security Protocols.
Gavin Lowe. Proceedings of 9th IEEE Computer Security Foundations Workshop, 1996.
A Hierarchy of Authentication Specifications.
Gavin Lowe. Proceedings of 10th IEEE Computer Security Foundations Workshop, 1997.
Using CSP to Detect Errors in the TMN Protocol.
Gavin Lowe and Bill Roscoe.
In IEEE Transactions on Software Engineering, volume 23, number 10, 1997.
Casper: A Compiler for the Analysis of Security Protocols.
Gavin Lowe. Proceedings of 10th IEEE Computer Security Foundations Workshop, 1997.
Also in Journal of Computer Security, Volume 6, pages 53-84, 1998.
A Family of Attacks upon Authentication Protocols.
Gavin Lowe. Department of Mathematics and Computer Science, Technical Report 1997/5, University of Leicester, 1997.
A CSP Approach to Sequential Consistency
Gavin Lowe and Jim Davies. In Distributed Computing, volume 12, numbers 2, 3, pages 91-104, 1999.
Towards a Completeness Result for Model Checking of Security Protocols.
Gavin Lowe. Journal of Computer Security, Volume 7, Numbers 2, 3, pages 89-146, 1999. An earlier version appeared in Proceedings of 11th IEEE Computer Security Foundations Workshop, pages 96-105, 1998.
Simplifying Transformations for Security Protocols.
Mei Lin Hui and Gavin Lowe. In Proceedings of 12th IEEE Computer Security Foundations Workshop, pages 32-43, 1999.
Analyzing a Library of Security Protocols using Casper and FDR.
Ben Donovan, Paul Norris and Gavin Lowe. In Proceedings of the Workshop on Formal Methods and Security Protocols, 1999. Some of the Casper scripts are available here (gzipped, tarred directory).
How to Prevent Type Flaw Attacks on Security Protocols.
James Heather, Gavin Lowe and Steve Schneider. In Proceedings of 13th IEEE Computer Security Foundations Workshop, pages 255-268, 2000.
Data independent verification of crypto-protocols.
A. W. Roscoe, Philippa J. Broadfoot and Gavin Lowe. In The First Irish Conference on the Mathematical Foundations of Computer Science and Information Technology (MFCSIT2000) Electronic Notes in Theoretical Computer Science, Volume 40, 2000.
Automating Data Independence.
Philippa Broadfoot, Gavin Lowe and Bill Roscoe. In Proceedings of ESORICS 2000, pages 175-190, 2000.
Fault-Preserving Simplifying Transformations for Security Protocols.
Mei Lin Hui and Gavin Lowe. Journal of Computer Security, volume 9, pages 3-46, 2001.
Modelling and Analysis of Security Protocols.
Peter Ryan, Steve Schneider, Michael Goldsmith, Gavin Lowe and Bill Roscoe. Addison-Wesley, 2001.
Quantifying Information Flow.
Gavin Lowe. In Proceedings of the 15th IEEE Computer Security Foundations Workshop, 2002.
Analysing Protocols Subject to Guessing Attacks.
Gavin Lowe. In Proceedings of the Workshop on Issues in the Theory of Security (WITS '02), 2002.
Analysing a Stream Authentication Protocol using Model Checking.
Philippa Broadfoot and Gavin Lowe. In Proceedings of the 7th European Symposium on Research in Computer Security (ESORICS), 2002. The CSP files associated with this paper are available here.
Using CSP to detect Insertion and Evasion Possibilities within the Intrusion Detection Area.
Gordon Rohrmair and Gavin Lowe. In Proceedings of BCS Workshop on Formal Aspects of Security, 2002.
How to Prevent Type Flaw Attacks on Security Protocols.
James Heather, Gavin Lowe and Steve Schneider. In Journal of Computer Security, Volume 11, Number 2, 2003.
On Distributed Security Transactions that use Secure Transport Protocols.
Philippa Broadfoot and Gavin Lowe. In Proceedings of the 16th IEEE Computer Security Foundations Workshop, 2003.
Managing dynamic user communities in a grid of autonomous resources
The Security Coordination Group of the EU DataGrid Project. In Conference for Computing in High Energy and Nuclear Physics, March 2003.
Using Data-Independence in the Analysis of Intrusion Detection Systems.
Gordon Rohrmair and Gavin Lowe. In Proceedings of the Workshop on Issues in the Theory of Security (WITS '03), 2003.
On the Automatic Verification of Non-Standard Measures of Consistency.
Christie Bolton and Gavin Lowe. In Proceedings of the International Workshop on Formal Methods, 2003.
A Hierarchy of Failures-Based Models.
Christie Bolton and Gavin Lowe. In Proceedings of EXPRESS: Expressiveness in Concurrency, 2003.
Analysing Protocols Subject to Guessing Attacks.
Gavin Lowe. In Journal of Computer Security, Volume 12, Number 1, 2004.
Semantic Models for Information Flow.
Gavin Lowe. In Theoretical Computer Science, Volume 315, pages 209-256, 2004.
Defining Information Flow Quantity.
Gavin Lowe. In Journal of Computer Security, Volume 12, Numbers 3, 4, 2004.
On the Application of Counterexample-Guided Abstraction Refinement and Data Independence to the Parameterised Model Checking Problem.
Gavin Lowe. In Proceedings of AVIS'04 - Third International Workshop on Automatic Verification of Infinite-State Systems, 2004.
Analyses of the Reverse Path Forwarding Routing Algorithm.
Christie Bolton and Gavin Lowe. In Proceedings of The International Conference on Dependable Systems and Networks, 2004.
Analysing a Stream Authentication Protocol using Model Checking.
Philippa Hopcroft and Gavin Lowe. In International Journal of Information Security, Volume 3, Number 1, pages 2--13, 2004.
A Hierarchy of Failures-Based Models.
Christie Bolton and Gavin Lowe. In Theoretical Computer Science, Volume 330, Number 3, pages 407-438, 2005.
Using Data-Independence in the Analysis of Intrusion Detection Systems.
Gordon Thomas Rohrmair and Gavin Lowe. In Theoretical Computer Science, Volume 340, Number 1, pages 82-101, 2005.
On Timed Models and Full Abstraction.
Gavin Lowe and Joel Ouaknine. In Proceedings of the 21st Annual Conference on Mathematical Foundations of Programming Semantics (MFPS XXI), pages 313--332, 2005.
A Computational Justification for Guessing Attack Formalisms.
Tom Newcomb and Gavin Lowe. In Proceedings of the Workshop on Issues in the Theory of Security (WITS '06), 2006.
On the Specification of Secure Channels.
Christopher Dilloway and Gavin Lowe. To appear in Proceedings of the Workshop on Issues in the Theory of Security (WITS '07), 2007.
On information flow and refinement-closure.
Gavin Lowe. In Proceedings of the Workshop on Issues in the Theory of Security (WITS '07), 2007.
Authority Analysis for Least Privilege Environments.
Toby Murray and Gavin Lowe. To appear in Proceedings of Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS-ARSPA'07), 2007.


Gavin Lowe / gavin.lowe@comlab.ox.ac.uk
Random Image
Random Image
Random Image