Dr. Anca D. Jurcut       


Position:
Postdoctoral Researcher
Department of Electronic and Computer Engineering,
University of Limerick,
Limerick, Ireland

Previous Positions
Teaching Assistant (C++, Java, Engineer Maths 5, Numeric Analysis, Cryptographic Mathematics, Differential Equations), 2008 - 2013, University of Limerick, Ireland
Software Developer, 2007, ATOSS Software AG, Timisoara, Romania

Academic Degrees:
PhD, 2013, University of Limerick, Ireland.
Bachelor of Mathematics and Computer Science, 2007, West University of Timisoara, Romania
e-mail: anca.jurcut@ul.ie Tel: +353-86-3726908 Fax: +353-61-338176

Research Interests:

Security Protocols Analysis:
My research on security protocols analysis focuses on the correct design and the verification of protocols. The work on verification includes both, manual and automated techniques. Contributions so far include: the verification of a number of cryptographic protocols, discovery of hitherto unknown protocol flaws, the publication of verifiably corrections to the protocols discovered to be faulty, the development of a new taxonomy of design guidelines for the prevention of attacks on cryptographic protocols and the development a new automated logic theory with attack detection capability for the formal analysis of security protocols.

Mathematical Modelling:
The research on mathematical modelling concerns the development of a new logic theory that expands the capabilities of logic-based verification techniques, by adding attack detection to their traditional role of proving that protocols meet their security goals. Particular focus is given to the mathematical modelling of security protocols' messages, steps, message exchanges, principals involved, attackers/intruders, possible scenarios of attacks, parallel runs, etc. Contributions so far include the development of a novel Attack Detection Logic theory and the establishment of its soundness. The proposed Attack Detection Logic has a unique attack detection capability for replay and parallel session attacks and it provides generic structures of the detected attacks. The proposed logic can cooperate with conventional verification logics. Together the combined logics have the capability to achieve both objectives of formal security protocol verification (i.e. proving that the verified protocol meets its security goals and demonstrating the absence of mountable attacks against the protocol).

Automated Techniques for Formal Verification:
The research on automated techniques for formal verification concerns the automation of logics for verification purposes. Contributions so far include the integration and the implementation of the Attack Detection Logic theory into an automated verification tool using a proving engine for cryptographic protocols.

Other Interests Include:
Cryptographic Maths, Protocol Specification Languages, Theorem Proving Techniques, Computer Algorithms


Research Project Participation:

Project:A New Automated Logic Theory with Attack Detection Capability for the Formal Analysis of Security Protocols
Principal Investigator:Prof. Tom Coffey
Funded by:Science Foundation Ireland (SFI) Research Frontiers Programme Award 11/RFP.1/CMS/3340
Project Duration:July 2011 - August 2015
Involvement:Collaborator, January 2012 - December 2014
 
Project:A new logic for automated verification of advanced security protocols
Funded by:Irish Research Council for Science, Engineering and Technology - Embark Initiative
Project Duration:October 2007 - September 2011
 

Selected Publications:

  • Jurcut, A., Coffey, T. and Dojen, R., "Design Guidelines for Security Protocols to Prevent Replay & Parallel Session Attacks", Elsevier Computer & Security, Volume 45, September 2014, pp. 255-273
  • Jurcut, A.D., Coffey, T., Dojen, R., "On the Prevention and Detection of Replay Attacks using a Logic-based Verification Tool", In: Computer Networks, Series: Communications in Computer and Information Science, Springer International Publishing Switzerland, Volume 431, ISBN: 978-3-319-07940-0, pp. 128-137, June , 2014.
  • Jurcut, A.D., Coffey, T., Dojen, R., "Design requirements to counter parallel session attacks in security protocols", Twelfth Annual Conference on Privacy, Security and Trust (PST 2014), IEEE, ISBN: 978-1-4799-3502-4, pp. 298 - 305, Toronto, Canada , July 2014, DOI: 10.1109/PST.2014.6890952.
  • Jurcut, A.D., Coffey, T., Dojen, R., "On the Prevention and Detection of Replay Attacks using a Logic-based Verification Tool", 21st International Conference on Computer Networks (CN 2014), pp. 128-137, Brunów, Poland, June 23-27, 2014, DOI: 10.1007/978-3-319-07941-7_13
  • Jurcut, A., Coffey, T., Dojen, R. and Gyorodi, R., "Security Protocol Design: A Case Study Using Key Distribution Protocols", Journal of Computer Science and Control Systems, Vol. 2, Nr. 2, ISSN 1844-6043, pp. 16-21, 2009.
  • Jurcut, A., Coffey, T., Dojen, R., and Gyorodi, R., "Wekanesses and Improvements of a Key Distribution Security Protocol", Annals of the University of Craiova, Series: Automation, Computers, Electronics and Mechatronics, Vol. 5(32), No. 1, ISSN 1841-0626, pp.36-42, December 2008.
  • Jurcut, A., Coffey, T., Dojen, R. "Symmetry in Security Protocol Cryptographic Messages - A Serious Weakness Exploitable by Parallel Session Attacks", 1st International Workshop on Modern Cryptography and Security Engineering (MoCrySEn 2012), 20-24 August 2012, Prague, Czech Republic.
  • Jurcut, A., Coffey, T., Dojen, R. and Gyorodi, R., "Security Protocol Design: A Case Study Using Key Distribution Protocols", 10th International Conference on Engineering of Modern Electric Systems, 27-30 May 2009, Oradea, Romania.
  • Dojen, R., Jurcut, A., Coffey, T., Gyorodi, C. "On establishing and fixing a parallel session attack in a security protocol", 2th International Symposium on Intelligent Distributed Computing, Springer Berlin / Heidelberg , ISSN1860-949X, Catania, Italy, pp. 239-244, September 2008.
  • Pasca, V., Jurcut, A., Dojen, R., Coffey, T. "Determining a Parallel Session Attack on a Key Distribution Protocol using a Model Checker", MoMM '08 Linz, Austria, ACM, 2008.
  • Dojen, R., Jurcut, A., Coffey, T. and Gyorodi, C., "On establishing and fixing a parallel session attack in a security protocol", In: Intelligent Distributed Computing, Systems and Applications, Series: Studies in Computational Intelligence, Springer Berlin / Heidelberg, Volume 162/2008, ISBN 978-3-540-85256-8, pp.239-244, September 2008.
  • Jurcut, A., Coffey, T., Dojen, R. and Gyorodi, R., "Analysis of a key-establishment security protocol", Journal of Computer Science and Control Systems, Vol. 2008, ISSN 1844-6043, pp. 42-47, 2008.