ATTACK INTERFERENCE IN NON-COLLABORATIVE SCENARIOS FOR SECURITY PROTOCOL ANALYSIS
M.-Camilla Fiazza, Michele Peroli, Luca Viganò
2011
Abstract
In security protocol analysis, the traditional choice to consider a single Dolev-Yao attacker is supported by the fact that models with multiple collaborating Dolev-Yao attackers have been shown to be reducible to models with one Dolev-Yao attacker. In this paper, we take a fundamentally different approach and investigate the case of multiple non-collaborating attackers. After formalizing the framework for multi-attacker scenarios, we show with a case study that concurrent competitive attacks can interfere with each other. We then present a new strategy to defend security protocols, based on active exploitation of attack interference. The paper can be seen as providing two proof-of-concept results: (i) it is possible to exploit interference to mitigate protocol vulnerabilities, thus providing a form of protection to protocols; (ii) the search for defense strategies requires scenarios with at least two attackers.
References
- Abadi, M., Blanchet, B., and Comon-Lundh, H. (2009). Models and proofs of protocol security: A progress report. In Proceedings of CAV'09, LNCS 5643, pages 35-49. Springer.
- Abadi, M., Blanchet, B., and Comon-Lundh, H. (2009). Models and proofs of protocol security: A progress report. In Proceedings of CAV'09, LNCS 5643, pages 35-49. Springer.
- Arsac, W., Bella, G., Chantry, X., and Compagna, L. (2009). Validating Security Protocols under the General Attacker. In Proceedings of ARSPA-WITS 2009, LNCS 5511, pages 34-51. Springer.
- Arsac, W., Bella, G., Chantry, X., and Compagna, L. (2009). Validating Security Protocols under the General Attacker. In Proceedings of ARSPA-WITS 2009, LNCS 5511, pages 34-51. Springer.
- Basin, D., Capkun, S., Schaller, P., and Schmidt, B. (2009). Let's get physical: Models and methods for real-world security protocols. In Proceedings of TPHOLs'09, LNCS 5674, pages 1-22. Springer.
- Basin, D., Capkun, S., Schaller, P., and Schmidt, B. (2009). Let's get physical: Models and methods for real-world security protocols. In Proceedings of TPHOLs'09, LNCS 5674, pages 1-22. Springer.
- Basin, D. and Cremers, C. (2010). Modeling and analyzing security in the presence of compromising adversaries. In Proceedings of ESORICS 2010, LNCS 6345, pages 340-356. Springer.
- Basin, D. and Cremers, C. (2010). Modeling and analyzing security in the presence of compromising adversaries. In Proceedings of ESORICS 2010, LNCS 6345, pages 340-356. Springer.
- Bella, G., Bistarelli, S., and Massacci, F. (2003). A protocol's life after attacks. In Proceedings of 11th International Workshop on Security Protocols, LNCS 3364, pages 3-18. Springer.
- Bella, G., Bistarelli, S., and Massacci, F. (2003). A protocol's life after attacks. In Proceedings of 11th International Workshop on Security Protocols, LNCS 3364, pages 3-18. Springer.
- Bella, G., Bistarelli, S., and Massacci, F. (2008). Retaliation against protocol attacks. Journal of Information Assurance and Security, 3:313-325.
- Bella, G., Bistarelli, S., and Massacci, F. (2008). Retaliation against protocol attacks. Journal of Information Assurance and Security, 3:313-325.
- Boyd, C. and Mathuria, A. (2003). Protocols for Authentication and Key Establishment. Springer.
- Boyd, C. and Mathuria, A. (2003). Protocols for Authentication and Key Establishment. Springer.
- Caleiro, C., Viganò, L., and Basin, D. (2005). Metareasoning about security protocols using distributed temporal logic. Electronic Notes in Theoretical Computer Science, 125(1):67-89.
- Caleiro, C., Viganò, L., and Basin, D. (2005). Metareasoning about security protocols using distributed temporal logic. Electronic Notes in Theoretical Computer Science, 125(1):67-89.
- Caleiro, C., Viganò, L., and Basin, D. (2006). On the semantics of Alice & Bob specifications of security protocols. Theoretical Computer Science, 367(1-2):88 - 122.
- Caleiro, C., Viganò, L., and Basin, D. (2006). On the semantics of Alice & Bob specifications of security protocols. Theoretical Computer Science, 367(1-2):88 - 122.
- Comon-Lundh, H. and Cortier, V. (2003). Security properties: two agents are sufficient. In Proceedings of ESOP'2003, LNCS 2618, pages 99-113. Springer.
- Comon-Lundh, H. and Cortier, V. (2003). Security properties: two agents are sufficient. In Proceedings of ESOP'2003, LNCS 2618, pages 99-113. Springer.
- Dilloway, C. and Lowe, G. (2007). On the specification of secure channels. In Proceedings of WITS'07.
- Dilloway, C. and Lowe, G. (2007). On the specification of secure channels. In Proceedings of WITS'07.
- Dolev, D. and Yao, A. C. (1983). On the security of public key protocols. IEEE Trans. Inform. Theory, 29(2):198-208.
- Dolev, D. and Yao, A. C. (1983). On the security of public key protocols. IEEE Trans. Inform. Theory, 29(2):198-208.
- Fiazza, M. C., Peroli, M., and Viganò, L. (2011). Attack Interference in Non-Collaborative Scenarios for Security Protocol Analysis (extended version). Available at www.arxiv.org.
- Fiazza, M. C., Peroli, M., and Viganò, L. (2011). Attack Interference in Non-Collaborative Scenarios for Security Protocol Analysis (extended version). Available at www.arxiv.org.
- Kamil, A. and Lowe, G. (2010). Specifying and modelling secure channels in strand spaces. In Proceedings of FAST'09, LNCS 5983, pages 233-247. Springer.
- Kamil, A. and Lowe, G. (2010). Specifying and modelling secure channels in strand spaces. In Proceedings of FAST'09, LNCS 5983, pages 233-247. Springer.
- Millen, J. K. and Denker, G. (2002). Capsl and mucapsl. Journal of Telecommunications and Information Technology, 4:16-27.
- Millen, J. K. and Denker, G. (2002). Capsl and mucapsl. Journal of Telecommunications and Information Technology, 4:16-27.
- Mödersheim, S., Viganò, L., and Basin, D. A. (2010). Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols. Journal of Computer Security, 18(4):575-618.
- Mödersheim, S., Viganò, L., and Basin, D. A. (2010). Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols. Journal of Computer Security, 18(4):575-618.
- Schaller, P., Schmidt, B., Basin, D., and Capkun, S. (2009). Modeling and verifying physical properties of security protocols for wireless networks. In Proceedings of CSF'09. IEEE Computer Society.
- Schaller, P., Schmidt, B., Basin, D., and Capkun, S. (2009). Modeling and verifying physical properties of security protocols for wireless networks. In Proceedings of CSF'09. IEEE Computer Society.
- Syverson, P., Meadows, C., and Cervesato, I. (2000). Dolev-Yao is no better than Machiavelli. In Proceedings of WITS'00, pages 87-92.
- Syverson, P., Meadows, C., and Cervesato, I. (2000). Dolev-Yao is no better than Machiavelli. In Proceedings of WITS'00, pages 87-92.
Paper Citation
in Harvard Style
Fiazza M., Peroli M. and Viganò L. (2011). ATTACK INTERFERENCE IN NON-COLLABORATIVE SCENARIOS FOR SECURITY PROTOCOL ANALYSIS . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011) ISBN 978-989-8425-71-3, pages 144-156. DOI: 10.5220/0003516801440156
in Harvard Style
Fiazza M., Peroli M. and Viganò L. (2011). ATTACK INTERFERENCE IN NON-COLLABORATIVE SCENARIOS FOR SECURITY PROTOCOL ANALYSIS . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011) ISBN 978-989-8425-71-3, pages 144-156. DOI: 10.5220/0003516801440156
in Bibtex Style
@conference{secrypt11,
author={M.-Camilla Fiazza and Michele Peroli and Luca Viganò},
title={ATTACK INTERFERENCE IN NON-COLLABORATIVE SCENARIOS FOR SECURITY PROTOCOL ANALYSIS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)},
year={2011},
pages={144-156},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003516801440156},
isbn={978-989-8425-71-3},
}
in Bibtex Style
@conference{secrypt11,
author={M.-Camilla Fiazza and Michele Peroli and Luca Viganò},
title={ATTACK INTERFERENCE IN NON-COLLABORATIVE SCENARIOS FOR SECURITY PROTOCOL ANALYSIS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)},
year={2011},
pages={144-156},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003516801440156},
isbn={978-989-8425-71-3},
}
in EndNote Style
TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)
TI - ATTACK INTERFERENCE IN NON-COLLABORATIVE SCENARIOS FOR SECURITY PROTOCOL ANALYSIS
SN - 978-989-8425-71-3
AU - Fiazza M.
AU - Peroli M.
AU - Viganò L.
PY - 2011
SP - 144
EP - 156
DO - 10.5220/0003516801440156
in EndNote Style
TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)
TI - ATTACK INTERFERENCE IN NON-COLLABORATIVE SCENARIOS FOR SECURITY PROTOCOL ANALYSIS
SN - 978-989-8425-71-3
AU - Fiazza M.
AU - Peroli M.
AU - Viganò L.
PY - 2011
SP - 144
EP - 156
DO - 10.5220/0003516801440156