what are, and how to define, the threat models
for a security protocol and its expected human
users,
the latter pair forming a heterogeneous system that is
typically termed a security ceremony (Ellison, 2007).
While existing works (such as the ones cited
above) define threats that are reasonable, they gener-
ally fail to treat the threats systematically within the
given ceremony, hence potentially missing relevant
combinations of threats. For example, a vulnerability
in a website might be exploited by a specific sequence
of user actions, which an attacking third party would
need to deceive the user to take. This attack cannot
be discussed without admitting a complicated threat
model that combines at the same time (but without
any form of collusion): (i) a bug in the website, (ii) a
user who makes wrong choices and (iii) an active at-
tacker capable of deception.
A huge variety of similar situations may under-
lie modern security ceremonies, and that variety is, in
turn, due to the variety of the ceremonies themselves,
with different levels of intricacies and innumerable
applications, ranging from pre-purchasing a cinema
ticket via the web to obtaining an extended valida-
tion certificate. A remarkable, recent and large-scale,
attack saw the “Norbertvdberg” hacker advertise his
online seed generator iotaseed.io through Google for
a semester; but the generator was bogus, so that Nor-
bertvdberg could hack a number of seeds and harvest
a total of $3.94 million worth of IOTA at the only ex-
tra effort of mounting a DDoS against the IOTA net-
work to prevent investigation. Here, both the hacker
and his website acted maliciously, though arguably in
different ways, mounting a complex socio-technical
attack against both users and the IOTA infrastructure.
Therefore, it is clear that security ceremonies
don’t succumb to the “one threat model to rule them
all” proviso as security protocols traditionally did
with the Dolev-Yao attacker model (Dolev and Yao,
1983). In fact, the Dolev-Yao model has proved to be
very successful for the analysis of security protocols,
where the almighty attacker “rules” over the other
protocol agents who are assumed to behave only as
prescribed by the protocol specification. However, in
the case of security ceremonies such an attacker pro-
vides an inherent “flattening” that likely makes one
miss relevant threat scenarios. By analogy, one could
say that the Dolev-Yao attacker is a powerful ham-
mer... but to a man with a hammer, everything looks
like a nail, forgetting that there are also screws and
nuts and bots (for which a hammer is inadequate).
We advocate that for security ceremonies we need
an approach that provides a birds-eye view, an “over-
view” that allows one to consider what are the differ-
ent threats and where they lie, with the ultimate aim
of finding novel attacks.
1.2 Contributions
The main contribution of this paper is thus
the systematic definition of an encompassing
method to build the full threat model chart for
security ceremonies from which one can con-
veniently reify the threat models of interest for
the ceremony under consideration.
The method starts with a classification of the princi-
pals participating in security ceremonies and contin-
ues with a motivated labelling system for their actions
and principals. Contrarily to some of the mentioned
works, our method abstracts away from the reasons
that determine human actions such as error. It then
continues by systematically combining the principal
labels to derive a number of threat models that, to-
gether, form the full chart of threat models for the
ceremony. We shall see that the higher the number
of principals in a ceremony, the more complicated its
full threat model chart: we shall represent it as a table,
where each line signifies a specific threat model.
For concreteness, we demonstrate the application
of the method on three ceremonies that have already
been considered, albeit at different levels of detail and
analysis, in the literature:
• MP-Auth (Basin et al., 2016; Mannan and van
Oorschot, 2011),
• Opera Mini (Radke et al., 2011)), and
• the Danish Mobilpendlerkort ceremony (Gius-
tolisi, 2017).
We discuss how the full threat model chart suggests
some interesting threats that haven’t been investigated
although they are well worth of scrutiny. In particular,
we find out that the Danish Mobilpendlerkort cere-
mony is vulnerable to the combination of an attack-
ing third party and a malicious phone of the ticket
holder’s. The threat model that leads to this vulner-
ability has not been considered so far and arises here
thanks to our charting method.
To demonstrate the relevance of the chart we mod-
elled and analysed this threat model using the formal
and automated tool Tamarin (Tamarin, 2018), which
enables the unbounded verification of security pro-
tocols, although it is important to highlight that our
method is generic and can be used with any tool for
the analysis of security protocols and ceremonies.
SECRYPT 2019 - 16th International Conference on Security and Cryptography
162