Abstract
The shrinking size of microprocessors as well as the ubiquity of wireless communication have led to the proliferation of portable computing devices with novel security requirements. Whereas traditional security protocols achieve their security goals relying solely on cryptographic primitives like encryptions and hash functions, the protocols employed to secure these devices establish and rely in addition on properties of the physical world. For instance, they may use, as basic building blocks, protocols for ensuring physical proximity, secure localisation, or secure neighbourhood discovery.
The aim of the POPSTAR ERC project is to develop techniques and tools to analyse protocols that establish and rely on properties of the physical world. We foresee that, at the end of the project, appropriate verification tools will be available to analyse the security and privacy of these "physical protocols". The research community in logics, program verification, and security has already a long tradition in developing techniques and tools to analyse key establishment and authentication protocols. Distance bounding protocols which are used to provide secure proximity control, raise new research challenges, and can not be analysed today using off-the-shelf verification tools.
- A. Armando and others. 2012. The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures. In Proc. 18th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'12), Vol. 7214. Springer, 267--282. Google ScholarDigital Library
- A. Armando, R. Carbone, L. Compagna, J. Cuéllar, and M. L. Tobarra. 2008. Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for Google apps. In Proc. 6th ACM Workshop on Formal Methods in Security Engineering (FMSE'08). ACM, 1--10. Google ScholarDigital Library
- G. Avoine and others. 2017b. Security of Distance-Bounding: A Survey. Comput. Surveys (2017). http://epubs.surrey.ac.uk/841451/Google Scholar
- G. Avoine, M. A. Bingöl, S. Kardaç, C. Lauradoux, and B. Martin. 2011. A framework for analyzing RFID distance bounding protocols. Journal of Computer Security 19, 2 (2011), 289--317. Google ScholarDigital Library
- G. Avoine, X. Bultel, S. Gambs, D. Gérault, P. Lafourcade, C. Onete, and J.-M. Robert. 2017a. A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol. In Proc. Asia Conference on Computer and Communications Security (AsiaCCS'17). ACM, 800--814. Google ScholarDigital Library
- D. Basin, S. Capkun, P. Schaller, and B. Schmidt. 2011. Formal reasoning about physical properties of security protocols. ACM Transactions on Information and System Security (TISSEC) 14, 2 (2011), 16. Google ScholarDigital Library
- B. Blanchet. 2001. An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In Proc. 14th Computer Security Foundations Workshop (CSFW'01). IEEE Computer Society Press, 82--96. Google ScholarDigital Library
- I. Boureanu, A. Mitrokotsa, and S. Vaudenay. 2015. Practical and provably secure distance-bounding. Journal of Computer Security 23, 2 (2015), 229--257.Google ScholarCross Ref
- S. Brands and D. Chaum. 1993. Distance-bounding protocols. In Workshop on the Theory and Application of of Cryptographic Techniques. Springer, 344--359. Google ScholarDigital Library
- X. Bultel, S. Gambs, D. Gérault, P. Lafourcade, C. Onete, and J.-M. Robert. 2016. A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol. In Proc. 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WISEC'16). ACM, 121--133. Google ScholarDigital Library
- T. Chothia, F. D. Garcia, J. de Ruiter, J. van den Breekel, and M. Thompson. 2015. Relay Cost Bounding for Contactless EMV Payments. In Proc. 19th International Conference on Financial Cryptography and Data Security (FC'15) (LNCS), Vol. 8975. Springer, 189--206.Google Scholar
- V. Cortier and B. Smyth. 2013. Attacking and fixing Helios: An analysis of ballot secrecy. Journal of Computer Security 21, 1 (2013), 89--148. Google ScholarDigital Library
- C. Cremers, K. B. Rasmussen, B. Schmidt, and S. Capkun. 2012. Distance hijacking attacks on distance bounding protocols. In Proc. 33rd Symposium on Security and Privacy (S&P'12). IEEE, 113--127. Google ScholarDigital Library
- A. Debant, S. Delaune, and C. Wiedling. 2018. Proving physical proximity using symbolic models. Research report. Univ Rennes, CNRS, IRISA, France. https://hal.archives-ouvertes.fr/hal-01708336Google Scholar
- A. Francillon, B. Danev, and S. Capkun. 2011. Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars. In Proc. Network and Distributed System Security Symposium, (NDSS'11).Google Scholar
- C. H. Kim, G. Avoine, F. Koeune, F.-X. Standaert, and O. Pereira. 2008. The swiss-knife RFID distance bounding protocol. In International Conference on Information Security and Cryptology. Springer, 98--115.Google Scholar
- S. Mauw, Z. Smith, J. Toro-Pozo, and R. Trujillo-Rasua. 2018. Distance-Bounding Protocols: Verification without Time and Location. In Proc. 39th Symposium on Security and Privacy (S&P'18).Google Scholar
- S. Meier, B. Schmidt, C. Cremers, and D. Basin. 2013. The Tamarin Prover for the Symbolic Analysis of Security Protocols. In Proc. 25th International Conference on Computer Aided Verification (CAV'13) (LNCS), Vol. 8044. Springer, 696--701.Google Scholar
- V. Nigam, C. Talcott, and A. A. Urquiza. 2016. Towards the Automated Verification of Cyber-Physical Security Protocols: Bounding the Number of Timed Intruders. In Proc. 21st European Symposium on Research in Computer Security (ESORICS'16). Springer, 450--470.Google Scholar
- S. Vaudenay. 2013. On Modeling Terrorist Frauds - Addressing Collusion in Distance Bounding Protocols. In Proc. 7th International Conference on Provable Security (ProvSec'13) (LNCS), Vol. 8209. Springer, 1--20. Google ScholarDigital Library
Index Terms
- POPSTAR: so near and yet so far
Recommendations
Protocols for Multiparty Coin Toss with a Dishonest Majority
Coin-tossing protocols are protocols that generate a random bit with uniform distribution, although some corrupted parties might try to bias the output. These protocols are used as a building block in many cryptographic protocols. Cleve (Proc. of the ...
Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious
Proceedings, Part I, of the 14th International Conference on Theory of Cryptography - Volume 9985An $$\alpha $$α-fair coin-tossing protocol allows a set of mutually distrustful parties to generate a uniform bit, such that no efficient adversary can bias the output bit by more than $$\alpha $$α. Cleve [STOC 1986] has shown that if half of the ...
An almost-optimally fair three-party coin-flipping protocol
STOC '14: Proceedings of the forty-sixth annual ACM symposium on Theory of computingIn a multiparty fair coin-flipping protocol, the parties output a common (close to) unbiased bit, even when some corrupted parties try to bias the output. Cleve [STOC 1986] has shown that in the case of dishonest majority (i.e., at least half of the ...
Comments