Loading…
An environmental paradigm for defending security protocols
In scenarios with multiple non-collaborating attackers, interference between simultaneous attack procedures can emerge. Interference has a wide range of consequences: it demands network models capable of supporting concurrence, it marks an unexpected complexity of the network environment, it can be...
Saved in:
Main Authors: | , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 438 |
container_issue | |
container_start_page | 427 |
container_title | |
container_volume | |
creator | Fiazza, Maria-Camilla Peroli, Michele Vigano, Luca |
description | In scenarios with multiple non-collaborating attackers, interference between simultaneous attack procedures can emerge. Interference has a wide range of consequences: it demands network models capable of supporting concurrence, it marks an unexpected complexity of the network environment, it can be exploited to construct partial defenses for vulnerable security protocols. In this paper, we describe a paradigm shift to support the investigation of interference with applications to constructing executable defenses for vulnerable protocols. We recruit tools from fields, such as AI and robotics, that have a suitably complex notion of agent, introduce a mechanism for the controlled execution of a protocol run and formalize it in terms of labeled transition systems. Finally, we show how the general problem of constructing defenses can be addressed systematically within the paradigm. |
doi_str_mv | 10.1109/CTS.2012.6261087 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6261087</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6261087</ieee_id><sourcerecordid>6261087</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-c06de071ffe696c64a1dca29a21accbf456adcfeffa44710070bb20c7377134d3</originalsourceid><addsrcrecordid>eNpFj01LxDAURSMiqOPsBTf5A63vJZmkdTcUv2DAhd0PafIyRNq0pFWYf--AA97N5Wwu5zJ2j1AiQv3YtJ-lABSlFhqhMhfsFpU2EmUF5vIfcHPN1vP8BaeYCkHLG_a0TZzST8xjGigttueTzdbHw8DDmLmnQMnHdOAzue8clyOf8riMbuznO3YVbD_T-twr1r48t81bsft4fW-2uyLWsBQOtCcwGALpWjutLHpnRW0FWue6oDbaehcoBKuUwZMZdJ0AZ6QxKJWXK_bwNxuJaD_lONh83J-vyl8o2khu</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>An environmental paradigm for defending security protocols</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Fiazza, Maria-Camilla ; Peroli, Michele ; Vigano, Luca</creator><creatorcontrib>Fiazza, Maria-Camilla ; Peroli, Michele ; Vigano, Luca</creatorcontrib><description>In scenarios with multiple non-collaborating attackers, interference between simultaneous attack procedures can emerge. Interference has a wide range of consequences: it demands network models capable of supporting concurrence, it marks an unexpected complexity of the network environment, it can be exploited to construct partial defenses for vulnerable security protocols. In this paper, we describe a paradigm shift to support the investigation of interference with applications to constructing executable defenses for vulnerable protocols. We recruit tools from fields, such as AI and robotics, that have a suitably complex notion of agent, introduce a mechanism for the controlled execution of a protocol run and formalize it in terms of labeled transition systems. Finally, we show how the general problem of constructing defenses can be addressed systematically within the paradigm.</description><identifier>ISBN: 1467313815</identifier><identifier>ISBN: 9781467313810</identifier><identifier>EISBN: 1467313807</identifier><identifier>EISBN: 1467313823</identifier><identifier>EISBN: 9781467313827</identifier><identifier>EISBN: 9781467313803</identifier><identifier>DOI: 10.1109/CTS.2012.6261087</identifier><language>eng</language><publisher>IEEE</publisher><subject>agent controller ; Cognition ; Collaboration ; competitive attacker ; Complexity theory ; Context modeling ; defense ; Interference ; Non-collaborating attackers ; protocol-as-environment ; Protocols ; Security</subject><ispartof>2012 International Conference on Collaboration Technologies and Systems (CTS), 2012, p.427-438</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6261087$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6261087$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Fiazza, Maria-Camilla</creatorcontrib><creatorcontrib>Peroli, Michele</creatorcontrib><creatorcontrib>Vigano, Luca</creatorcontrib><title>An environmental paradigm for defending security protocols</title><title>2012 International Conference on Collaboration Technologies and Systems (CTS)</title><addtitle>CTS</addtitle><description>In scenarios with multiple non-collaborating attackers, interference between simultaneous attack procedures can emerge. Interference has a wide range of consequences: it demands network models capable of supporting concurrence, it marks an unexpected complexity of the network environment, it can be exploited to construct partial defenses for vulnerable security protocols. In this paper, we describe a paradigm shift to support the investigation of interference with applications to constructing executable defenses for vulnerable protocols. We recruit tools from fields, such as AI and robotics, that have a suitably complex notion of agent, introduce a mechanism for the controlled execution of a protocol run and formalize it in terms of labeled transition systems. Finally, we show how the general problem of constructing defenses can be addressed systematically within the paradigm.</description><subject>agent controller</subject><subject>Cognition</subject><subject>Collaboration</subject><subject>competitive attacker</subject><subject>Complexity theory</subject><subject>Context modeling</subject><subject>defense</subject><subject>Interference</subject><subject>Non-collaborating attackers</subject><subject>protocol-as-environment</subject><subject>Protocols</subject><subject>Security</subject><isbn>1467313815</isbn><isbn>9781467313810</isbn><isbn>1467313807</isbn><isbn>1467313823</isbn><isbn>9781467313827</isbn><isbn>9781467313803</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2012</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNpFj01LxDAURSMiqOPsBTf5A63vJZmkdTcUv2DAhd0PafIyRNq0pFWYf--AA97N5Wwu5zJ2j1AiQv3YtJ-lABSlFhqhMhfsFpU2EmUF5vIfcHPN1vP8BaeYCkHLG_a0TZzST8xjGigttueTzdbHw8DDmLmnQMnHdOAzue8clyOf8riMbuznO3YVbD_T-twr1r48t81bsft4fW-2uyLWsBQOtCcwGALpWjutLHpnRW0FWue6oDbaehcoBKuUwZMZdJ0AZ6QxKJWXK_bwNxuJaD_lONh83J-vyl8o2khu</recordid><startdate>201205</startdate><enddate>201205</enddate><creator>Fiazza, Maria-Camilla</creator><creator>Peroli, Michele</creator><creator>Vigano, Luca</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201205</creationdate><title>An environmental paradigm for defending security protocols</title><author>Fiazza, Maria-Camilla ; Peroli, Michele ; Vigano, Luca</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-c06de071ffe696c64a1dca29a21accbf456adcfeffa44710070bb20c7377134d3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2012</creationdate><topic>agent controller</topic><topic>Cognition</topic><topic>Collaboration</topic><topic>competitive attacker</topic><topic>Complexity theory</topic><topic>Context modeling</topic><topic>defense</topic><topic>Interference</topic><topic>Non-collaborating attackers</topic><topic>protocol-as-environment</topic><topic>Protocols</topic><topic>Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Fiazza, Maria-Camilla</creatorcontrib><creatorcontrib>Peroli, Michele</creatorcontrib><creatorcontrib>Vigano, Luca</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Fiazza, Maria-Camilla</au><au>Peroli, Michele</au><au>Vigano, Luca</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>An environmental paradigm for defending security protocols</atitle><btitle>2012 International Conference on Collaboration Technologies and Systems (CTS)</btitle><stitle>CTS</stitle><date>2012-05</date><risdate>2012</risdate><spage>427</spage><epage>438</epage><pages>427-438</pages><isbn>1467313815</isbn><isbn>9781467313810</isbn><eisbn>1467313807</eisbn><eisbn>1467313823</eisbn><eisbn>9781467313827</eisbn><eisbn>9781467313803</eisbn><abstract>In scenarios with multiple non-collaborating attackers, interference between simultaneous attack procedures can emerge. Interference has a wide range of consequences: it demands network models capable of supporting concurrence, it marks an unexpected complexity of the network environment, it can be exploited to construct partial defenses for vulnerable security protocols. In this paper, we describe a paradigm shift to support the investigation of interference with applications to constructing executable defenses for vulnerable protocols. We recruit tools from fields, such as AI and robotics, that have a suitably complex notion of agent, introduce a mechanism for the controlled execution of a protocol run and formalize it in terms of labeled transition systems. Finally, we show how the general problem of constructing defenses can be addressed systematically within the paradigm.</abstract><pub>IEEE</pub><doi>10.1109/CTS.2012.6261087</doi><tpages>12</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 1467313815 |
ispartof | 2012 International Conference on Collaboration Technologies and Systems (CTS), 2012, p.427-438 |
issn | |
language | eng |
recordid | cdi_ieee_primary_6261087 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | agent controller Cognition Collaboration competitive attacker Complexity theory Context modeling defense Interference Non-collaborating attackers protocol-as-environment Protocols Security |
title | An environmental paradigm for defending security protocols |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-31T06%3A54%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=An%20environmental%20paradigm%20for%20defending%20security%20protocols&rft.btitle=2012%20International%20Conference%20on%20Collaboration%20Technologies%20and%20Systems%20(CTS)&rft.au=Fiazza,%20Maria-Camilla&rft.date=2012-05&rft.spage=427&rft.epage=438&rft.pages=427-438&rft.isbn=1467313815&rft.isbn_list=9781467313810&rft_id=info:doi/10.1109/CTS.2012.6261087&rft.eisbn=1467313807&rft.eisbn_list=1467313823&rft.eisbn_list=9781467313827&rft.eisbn_list=9781467313803&rft_dat=%3Cieee_6IE%3E6261087%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i90t-c06de071ffe696c64a1dca29a21accbf456adcfeffa44710070bb20c7377134d3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6261087&rfr_iscdi=true |