(2011). Multi-attacker protocol validation. Journal
of Automated Reasoning, 46(3-4):353–388.
Basin, D., Caleiro, C., Ramos, J., and Vigan`o, L. (2011).
Distributed temporal logic for the analysis of security
protocol models. Theoretical Computer Science. To
appear.
Basin, D., Capkun, S., Schaller, P., and Schmidt, B. (2009).
Let’s get physical: Models and methods for real-world
security protocols. In Proceedings of TPHOLs’09,
LNCS 5674, pages 1–22. Springer.
Basin, D. and Cremers, C. (2010). Modeling and analyzing
security in the presence of compromising adversaries.
In Proceedings of ESORICS 2010, LNCS 6345, pages
340–356. Springer.
Bella, G., Bistarelli, S., and Massacci, F. (2003). A proto-
col’s life after attacks. In Proceedings of 11th Interna-
tional Workshop on Security Protocols, LNCS 3364,
pages 3–18. Springer.
Bella, G., Bistarelli, S., and Massacci, F. (2008). Retalia-
tion against protocol attacks. Journal of Information
Assurance and Security, 3:313–325.
Boyd, C. and Mathuria, A. (2003). Protocols for Authenti-
cation and Key Establishment. Springer.
Caleiro, C., Vigan`o, L., and Basin, D. (2005). Metareason-
ing about security protocols using distributed tempo-
ral logic. Electronic Notes in Theoretical Computer
Science, 125(1):67–89.
Caleiro, C., Vigan`o, L., and Basin, D. (2006). On the se-
mantics of Alice & Bob specifications of security pro-
tocols. Theoretical Computer Science, 367(1-2):88 –
122.
Comon-Lundh, H. and Cortier, V. (2003). Security prop-
erties: two agents are sufficient. In Proceedings of
ESOP’2003, LNCS 2618, pages 99–113. Springer.
Dilloway, C. and Lowe, G. (2007). On the specification of
secure channels. In Proceedings of WITS’07.
Dolev, D. and Yao, A. C. (1983). On the security of
public key protocols. IEEE Trans. Inform. Theory,
29(2):198–208.
Fiazza, M. C., Peroli, M., and Vigan`o, L. (2011). Attack
Interference in Non-Collaborative Scenarios for Secu-
rity Protocol Analysis (extended version). Available at
www.arxiv.org.
Kamil, A. and Lowe, G. (2010). Specifying and modelling
secure channels in strand spaces. In Proceedings of
FAST’09, LNCS 5983, pages 233–247. Springer.
Millen, J. K. and Denker, G. (2002). Capsl and mucapsl.
Journal of Telecommunications and Information Tech-
nology, 4:16–27.
M¨odersheim, S., Vigan`o, L., and Basin, D. A. (2010). Con-
straint differentiation: Search-space reduction for the
constraint-based analysis of security protocols. Jour-
nal of Computer Security, 18(4):575–618.
Schaller, P., Schmidt, B., Basin, D., and Capkun, S. (2009).
Modeling and verifying physical properties of secu-
rity protocols for wireless networks. In Proceedings
of CSF’09. IEEE Computer Society.
Syverson, P., Meadows, C., and Cervesato, I. (2000).
Dolev-Yao is no better than Machiavelli. In Proceed-
ings of WITS’00, pages 87–92.
APPENDIX
In this appendix, we present a detailed view of the
outcome of an attack carried out against BME and in-
volving only the non-collaborative attackers E
1
and
E
2
. Refer to Section 3 for definitions of BME, at-
tacker behavior against BME, attack traces and cases.
Note that in cases 1, 2 and 3 (shown in Table 6),
E
j
’s request is the j-th served by S. In cases 4, 5 and
6, E
2
is the attacker with knowledge advantage. For
clarity, for cases 4 and 6 (see Table 6) we mark as
E
j
* the case in which E
j
’s request is served first by
S. In case 5, E
2
’s request is the only served and the
distinction is unnecessary.
A competitive attacker E attacking BME can:
• succeed and compromise a key that A will use;
• fail and realize it (by timeout);
• fail without realizing it, by acquiring the wrong
key;
• fail without realizing it, even though E acquired
the right key.
Honest agents under attack can:
• detect the attack and abandon the protocol before
carrying out step (3);
• realize that the key has been compromised and
keep safe by not using it;
• fail to detect an attack but use their keyssafely, be-
cause all attackers have failed to acquire the cor-
rect key;
• use a compromised key.
Attackers who realize their failure can infer the
following:
α Mislabeled or Unknown Attacker. The attacker
spies two messages from S and none from A in re-
sponse; he deduces that A had opened a single session
and that at least one request to S (in addition to his
own) was an attack. The attacker realizes that he has
either mislabeled as honest one of the active attackers
or that an unknown competitor is active.
β Unknown Attacker. The attacker spies two mes-
sages from S and none from A in response; he de-
duces that A had opened a single session and that at
least one request to S (in addition to his own) was an
attack. However, he has seen no additional requests
of the type (A,X) transit on the network; the attacker
realizes that an unknown competitor is active on the
network.
γ Missed Message: Mislabeled or Unknown At-
tacker. The attacker spies only one message from S
ATTACK INTERFERENCE IN NON-COLLABORATIVE SCENARIOS FOR SECURITY PROTOCOL ANALYSIS
155