Abstract
The process that allows one to get rewarded for returning a container through reverse vending machines (RVM) involves people and technology. In fact, it typically sees a set of human parties (e.g. customers, cashiers) and technical parties (e.g., RVMs, databases, scanners) to collaborate in order to enable effective recycling. In this paper, we advance a formal treatment of the Danish Deposit Return System (DRS). We investigate the security of the ceremony that people are expected to perform in the context of DRS using field observation and automated reasoning tools. We give a particular focus to the security threats due to people interacting with the technology behind DRS. The findings of our investigation enable novel considerations of the ceremony weaknesses and make it possible to delineate potential mitigations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The full Tamarin code is available at the link https://www.dropbox.com/s/qrinq3yc9kkrq4e/DRS_Tamarin.zip?dl=0.
References
Basin, D., Radomirovic, S., Schmid, L.: Modeling human errors in security protocols. In: 2016 IEEE 29th Computer Security Foundations Symposium (CSF), pp. 325–340, June 2016
Bella, G., Coles-Kemp, L.: Layered analysis of security ceremonies. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. IAICT, vol. 376, pp. 273–286. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-30436-1_23
Ellison, C.: Ceremony design and analysis. IACR eprint (2007)
Giustolisi, R.: Free rides in Denmark: lessons from improperly generated mobile transport tickets. In: Lipmaa, H., Mitrokotsa, A., Matulevičius, R. (eds.) NordSec 2017. LNCS, vol. 10674, pp. 159–174. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-70290-2_10
Johansen, C., Jøsang, A.: Probabilistic modelling of humans in security ceremonies. In: Garcia-Alfaro, J., et al. (eds.) DPM/QASA/SETOP-2014. LNCS, vol. 8872, pp. 277–292. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-17016-9_18
Jorgensen, A.: Method, system, reverse vending machine and use thereof for handling empty packaging, November 2005. https://patents.google.com/patent/US20050246225A1/en. US20050246225A1
Kavli, T.O., Njastad, J., Saether, G.: Method and apparatus for detecting fraud attempts in reverse vending machines, November 2012. https://patents.google.com/patent/US9189911. US9189911B2
Martimiano, T., Martina, J.E.: Daemones Non Operantur Nisi Per Artem. In: Matyáš, V., Švenda, P., Stajano, F., Christianson, B., Anderson, J. (eds.) Security Protocols 2018. LNCS, vol. 11286, pp. 96–105. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-03251-7_11
Martina, J.E., dos Santos, E., Carlos, M.C., Price, G., Custódio, R.F.: An adaptive threat model for security ceremonies. Int. J. Inf. Secur. 14(2), 103–121 (2014). https://doi.org/10.1007/s10207-014-0253-x
Meier, S., Schmidt, B., Cremers, C., Basin, D.: The TAMARIN prover for the symbolic analysis of security protocols. In: Sharygina, N., Veith, H. (eds.) CAV 2013. LNCS, vol. 8044, pp. 696–701. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39799-8_48
Müller, H.A., Jahnke, J.H., Smith, D.B., Storey, M.A., Tilley, S.R., Wong, K.: Reverse engineering: a roadmap. In: Proceedings of the Conference on The Future of Software Engineering, ICSE 2000, pp. 47–60. ACM, New York (2000)
Nordbryhn, A., Hansen, A.H.H.: Fraud detection, February 2019. https://patents.google.com/patent/EP3440641A1/en. EP3440641A1
Paulson, L.C.: The inductive approach to verifying cryptographic protocols. J. Comput. Secur. 6(1–2), 85–128 (1998)
Probst, C.W., Kammüller, F., Hansen, R.R.: Formal modelling and analysis of socio-technical systems. In: Probst, C.W., Hankin, C., Hansen, R.R. (eds.) Semantics, Logics, and Calculi. LNCS, vol. 9560, pp. 54–73. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-27810-0_3
Giustolisi, R., Bella, G., Lenzini, G.: Invalid certificates in modern browsers: a socio-technical analysis. IOS J. Comput. Secur. 26(4), 509–541 (2018)
Saether, G.: Means in a reverse vending machine (RVM) for receiving, handling, sorting and storing returnable items or objects, July 2010. https://patents.google.com/patent/US7754990B2/en. US7754990B2
Saether, G., Sivertsen, R., Lunde, T., Njastad, J.: Fraud detection system and method, August 2018. https://patents.google.com/patent/US20180232745A1/en. US20180232745A1
Stojkovski, B., Vazquez Sandoval, I., Lenzini, G.: Detecting misalignments between system security and user perceptions: a preliminary socio-technical analysis of an E2E email encryption system. In: 4th European Workshop on Usable Security (2019)
Tomra Systems ASA: myTOMRA app. https://www.mytomra.com.au/home/the-mytomra-app/. Accessed 05 July 2019
Tomra Systems ASA: Voucher control. https://www.tomra.com/en/collection/reverse-vending/tcs-digital/voucher-control. Accessed 05 July 2019
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Garbacz, I., Giustolisi, R., Møller Nielsen, K., Schuermann, C. (2021). A Security Analysis of the Danish Deposit Return System. In: Groß, T., Tryfonas, T. (eds) Socio-Technical Aspects in Security and Trust. STAST 2019. Lecture Notes in Computer Science(), vol 11739. Springer, Cham. https://doi.org/10.1007/978-3-030-55958-8_7
Download citation
DOI: https://doi.org/10.1007/978-3-030-55958-8_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-55957-1
Online ISBN: 978-3-030-55958-8
eBook Packages: Computer ScienceComputer Science (R0)