(Foto)

Anders Moen Hagalisletto

In general I am interested in all kinds of industrial applications (computer science),
of formal methods which means that there are many systems that I spend time
investigating. Before I joined PMA as a research fellow at the department of informatics,
I worked three years for Norwegian Computing Center , with special focus on formal
methods applied to industry in several projects and many different application areas.

Education

Current Research Interests

More specific research interests

  • High level Coloured Petri Nets, have a look at my resource page
  • Pi calculus and related process algebras, see Calculi for mobility
  • Maude
  • Modal logics of time, computation and knowledge (beliefs)
  • Protocol analyzators

    Other research interests

    Referee work for

    Some teaching (long term ago!)

    Publications

    I have sorted the publications with respect to topics.

    Railroad modeling using Petri Nets


    [1] Thor Kristoffersen, Anders Moen (Hagalisletto), and Hallstein Asheim Hansen: "Extracting High-Level Information from Petri Nets: A Railroad Case", Proceedings of the Estonian Academy of Physics and Mathematics, 2003, Volume 52, Number 4, pp. 378 - 393. pdf

    [2] Anders Moen (Hagalisletto) and Ingrid Chieh Yu: "Large Scale Construction of Railroad Models from Specifications", IEEE SMC 2004, Conference Proceedings 2004 Systems Man and Cybernetics, pp. 6212 - 6219, October, 2004. revised version

    [3] Joakim Bjørk, Anders Moen Hagalisletto, and Pål Enger: "Large scale simulations of Railroad Nets" MOCA 2006, Turku, Finland, 26 june, 2006, Proceedings of the Fourth International Workshop on Modelling of Objects, Components and Agents, Bericht 272, pp. 45 - 64. pdf

    [4] Anders Moen Hagalisletto, Joakim Bjørk, Ingrid Chieh Yu and Pål Enger: "Constructing and Refining Large Scale Railroad Models Represented by Petri Nets", Accepted for publication IEEE Transactions on Systems, Man and Cybernetics, Part C, Volume 37, Number 4, July 2007. colour version

    Security properties and protocols

    [5] Anders Moen Hagalisletto and Jon Haugsand: "A Formal Language for Specifying Security Properties", SAPS'04, 19th IEEE Conference on Automated Software Engineering 2004, Linz, Austria, September 20 - 24, 2004. pp. 245 - 255. corrected version

    [6] Anders Moen Hagalisletto: "Protocol Algebra", 11th IEEE Symposium on Computers and Communications, 26 - 29 June 2006, Cagliari, Sardinia, Italy, IEEE Computer Society, pp. 394 - 401. corrected version

    [7] Anders Moen Hagalisletto: "Automated Refinement of Security Protocols", SSN 2006, Proceedings of the 20th IEEE International Parallel & Distributed Processing Symposioum (IEEE IPDPS 2006), April 25-29, 2006, Rhodes Island, Greece. ISBN 1-4244-0054-6. extended version

    [8] Anders Moen Hagalisletto: "Errors in Attacks on Authentication Protocols", The Second International Conference on Availability, Reliability and Security, IEEE ARES 2007, April 10-13, 2007, Vienna, Austria, pp. 223 - 229, IEEE Computer Society, ISBN 0-7695-2775-2. report

    [9] Anders Moen Hagalisletto: "Attacks are Protocols Too", First International Workshop on Advances in Information Security, IEEE WAIS 2007, Collocated with ARES 2007, Vienna, Austria IEEE Computer Society, April 10-13, 2007, ISBN 0-7695-2775-2, pp. 1197 - 1206. corrected version

    [10] Anders Moen Hagalisletto: "Validating Attacks on Authentication Protocols", The 12th IEEE Symposium on Computers and Communications. Aveiro, Portugal, July 1-4, 2007. preliminary version

    [11] Anders Moen Hagalisletto and Olaf Owe: "Local Deduction of Trust", Security and Rewriting Techniques SecReT 2007, Paris, France, June 29, 2007. paper

    [12] Anders Moen Hagalisletto and Arne Rieber: "Using the mobile phone in two-factor authentication " the First International Workshop on Security for Spontaneous Interaction, IWSSI 2007, 16 september 2007, Innsbruck, Austria, affiliated to UbiComp 2007. previous version

    [13] Anders Moen Hagalisletto: "Automated support for the Design and Analysis of Security Protocols", Faculty of Mathematics and Natural Sciences, University of Oslo, 2007, Nr 681, ISSN : 1501-7710.

    [14] Anders Moen Hagalisletto: "Deciding the Correctness of Attacks on Authentication Protocols" Accepted for publication in Journal of Software, No. 5, 2008, Academy Publisher, ISSN : 1796-217X. available later

    [*] Anders Moen Hagalisletto: Analyzing two-factor authentication devices, Technical Report, University of Oslo, May, 2007. current version

    [15] Anders Moen Hagalisletto and Lars Strand: "Formal modelling of authentication in SIP", Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008, August 25-31, 2008, Cap Esterel, France, pp. 16-21, IEEE Computer Society revised version

    [16] Anders Moen Hagalisletto: "Proving Trust Locally", Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008, August 25-31, 2008, Cap Esterel, France, pp. 80-87, IEEE Computer Society paper

    [17] Anders Moen Hagalisletto: "Automated detection of confidentiality goals", 23rd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2009, Rome, Italy, May 23-29, 2009, pp 1-8 paper

    [18] Anders Moen Hagalisletto, Lars Strand, Wolfgang Leister, Arne-Kristian Groven: "Analysing Protocol Implementations". Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings , Lecture Notes in Computer Science Vol. 5451 pp. 171-182, ISBN 978-3-642-00842-9, Springer paper

    [19] Anders Moen Hagalisletto and Lars Strand: "Designing Attacks on SIP Call Setup" International Journal of Applied Cryptography (IJACT) Vol. 2, No. 1 2010, pp. 13 - 22 Special Issue on Information Security Practice and Experience Guest Editors: Feng Bao and Guilin Wang paper

    [20] Lothar Fritsch, Arne-Kristian Groven, Lars Strand, Wolfgang Leister, and Anders Moen Hagalisletto: "A Holistic Approach to Open Source VoIP Security: Results from the EUX2010SEC Project", International Journal on Advances in Security, ISSN 1942-2636, vol. 2, no. 2&3, 2009, pages 129-141 paper

    You can also look into Frida

    Research Seminar for PMA (DBSEM)

    See our web page: Computer Science seminar

    Master thesis proposals

    If you consider having me as supervisor, then its nice if you have the following courses in your bachelor: Here are some specific topics we could look into

    Master students that I have supervised or that still works for me

    Have a look at Joe Armstrongs amazingly funny paper Why OO sucks or at his own page Why OO sucks .
    But, let it remain a secret between us, don't tell anybody that I recommended it!
    Updated 15. february 2007 by Anders Moen
    thesis