Abstract
Traditionally security protocol analysis relies on a single Dolev-Yao attacker. This type of attacker is so powerful that overall attack power does not change if additional attackers cooperate. In this paper, we take a fundamentally different approach and investigate the case of multiple non-collaborating attackers. We show how non-collaboration between attackers gives rise to interference between ongoing attacks and that it is possible to actively exploit attack interference to mitigate security breaches and provide partial protection to weak protocols.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Arsac, W., Bella, G., Chantry, X., Compagna, L.: Validating Security Protocols under the General Attacker. In: Degano, P., ViganĂ², L. (eds.) ARSPA-WITS 2009. LNCS, vol. 5511, pp. 34–51. Springer, Heidelberg (2009)
Arsac, W., Bella, G., Chantry, X., Compagna, L.: Multi-attacker protocol validation. Journal of Automated Reasoning 46(3), 353–388 (2011)
Basin, D., Caleiro, C., Ramos, J., ViganĂ², L.: Distributed temporal logic for the analysis of security protocol models. Theoretical Computer Science 412(31), 4007–4043 (2011)
Basin, D., Capkun, S., Schaller, P., Schmidt, B.: Let’s Get Physical: Models and Methods for Real-World Security Protocols. In: Berghofer, S., Nipkow, T., Urban, C., Wenzel, M. (eds.) TPHOLs 2009. LNCS, vol. 5674, pp. 1–22. Springer, Heidelberg (2009)
Bella, G., Bistarelli, S., Massacci, F.: A Protocol’s Life After Attacks.. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2003. LNCS, vol. 3364, pp. 3–10. Springer, Heidelberg (2005)
Bella, G., Bistarelli, S., Massacci, F.: Retaliation against protocol attacks. Journal of Information Assurance and Security 3, 313–325 (2008)
Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Springer (2003)
Caleiro, C., ViganĂ², L., Basin, D.: Metareasoning about security protocols using distributed temporal logic. Electronic Notes in Theoretical Computer Science 125(1), 67–89 (2005)
Caleiro, C., ViganĂ², L., Basin, D.: On the Semantics of Alice & Bob Specifications of Security Protocols. Theoretical Computer Science 367(1-2), 88–122 (2006)
Comon-Lundh, H., Cortier, V.: Security Properties: Two Agents Are Sufficient. In: Degano, P. (ed.) ESOP 2003. LNCS, vol. 2618, pp. 99–113. Springer, Heidelberg (2003)
Dilloway, C., Lowe, G.: On the specification of secure channels. In: Proceedings of WITS 2007 (2007)
Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Trans. Inform. Theory 29(2), 198–208 (1983)
Fiazza, M.-C., Peroli, M., ViganĂ², L.: Attack Interference in Non-Collaborative Scenarios for Security Protocol Analysis. In: Proceedings of SECRYPT 2011, pp. 144–156. SciTePress (2011)
Kamil, A., Lowe, G.: Specifying and Modelling Secure Channels in Strand Spaces. In: Degano, P., Guttman, J.D. (eds.) FAST 2009. LNCS, vol. 5983, pp. 233–247. Springer, Heidelberg (2010)
Millen, J.K., Denker, G.: Capsl and mucapsl. Journal of Telecommunications and Information Technology 4, 16–27 (2002)
Mödersheim, S., ViganĂ², L., Basin, D.A.: Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols. Journal of Computer Security 18(4), 575–618 (2010)
Schaller, P., Schmidt, B., Basin, D., Capkun, S.: Modeling and verifying physical properties of security protocols for wireless networks. In: Proceedings of CSF, vol. 22. IEEE Computer Society (2009)
Syverson, P., Meadows, C., Cervesato, I.: Dolev-Yao is no better than Machiavelli. In: Proceedings of WITS 2000, pp. 87–92 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fiazza, MC., Peroli, M., ViganĂ², L. (2012). Attack Interference: A Path to Defending Security Protocols. In: Obaidat, M.S., Sevillano, J.L., Filipe, J. (eds) E-Business and Telecommunications. ICETE 2011. Communications in Computer and Information Science, vol 314. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35755-8_21
Download citation
DOI: https://doi.org/10.1007/978-3-642-35755-8_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35754-1
Online ISBN: 978-3-642-35755-8
eBook Packages: Computer ScienceComputer Science (R0)