Defending vulnerable security protocols by means of attack interference in non-collaborative scenarios

作者: Maria-Camilla Fiazza , Michele Peroli , Luca Viganò

DOI: 10.3389/FICT.2015.00011

关键词:

摘要: In security protocol analysis, the traditional choice to consider a single Dolev-Yao attacker is supported by fact that models with multiple collaborating attackers are reducible one attacker. this paper, we take fundamentally different approach and investigate case of non-collaborating attackers. We formalize framework for multi-attacker scenarios show, through study, concurrent competitive attacks can interfere each other. It then possible exploit interference provide form defense vulnerable protocols.

参考文章(19)
John Clark, Jeremy Jacob, A Survey of Authentication Protocol Literature ,(2010)
Maria-Camilla Fiazza, Michele Peroli, Luca Viganò, Attack Interference: A Path to Defending Security Protocols international conference on e business. ,vol. 314, pp. 296- 314 ,(2011) , 10.1007/978-3-642-35755-8_21
John Andrew Clark, Jeremy Lawrence Jacob, None, A survey of authentication protocol literature: Version 1.0 Citeseer. ,(1997)
David Basin, Srdjan Capkun, Patrick Schaller, Benedikt Schmidt, Let's Get Physical: Models and Methods for Real-World Security Protocols theorem proving in higher order logics. pp. 1- 22 ,(2009) , 10.1007/978-3-642-03359-9_1
Paul Syverson, Catherine Meadows, Iliano Cervesato, Dolev-Yao is no better than Machiavelli Defense Technical Information Center. ,(2000) , 10.21236/ADA464936
Wihem Arsac, Giampaolo Bella, Xavier Chantry, Luca Compagna, Validating Security Protocols under the General Attacker Lecture Notes in Computer Science. ,vol. 5511, pp. 34- 51 ,(2009) , 10.1007/978-3-642-03459-6_3
Giampaolo Bella, Stefano Bistarelli, Fabio Massacci, A Protocol’s Life After Attacks... Security Protocols. pp. 11- 18 ,(2005) , 10.1007/11542322_3
Colin Boyd, Anish Mathuria, Douglas Stebila, Protocols for Authentication and Key Establishment ,(2003)
Hubert Comon-Lundh, Véronique Cortier, Security properties: two agents are sufficient european symposium on programming. ,vol. 50, pp. 99- 113 ,(2003) , 10.1016/J.SCICO.2003.12.002
David Basin, Carlos Caleiro, Jaime Ramos, Luca Viganò, Distributed temporal logic for the analysis of security protocol models Theoretical Computer Science. ,vol. 412, pp. 4007- 4043 ,(2011) , 10.1016/J.TCS.2011.04.006