Loading…

An environmental paradigm for defending security protocols

In scenarios with multiple non-collaborating attackers, interference between simultaneous attack procedures can emerge. Interference has a wide range of consequences: it demands network models capable of supporting concurrence, it marks an unexpected complexity of the network environment, it can be...

Full description

Saved in:
Bibliographic Details
Main Authors: Fiazza, Maria-Camilla, Peroli, Michele, Vigano, Luca
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 438
container_issue
container_start_page 427
container_title
container_volume
creator Fiazza, Maria-Camilla
Peroli, Michele
Vigano, Luca
description In scenarios with multiple non-collaborating attackers, interference between simultaneous attack procedures can emerge. Interference has a wide range of consequences: it demands network models capable of supporting concurrence, it marks an unexpected complexity of the network environment, it can be exploited to construct partial defenses for vulnerable security protocols. In this paper, we describe a paradigm shift to support the investigation of interference with applications to constructing executable defenses for vulnerable protocols. We recruit tools from fields, such as AI and robotics, that have a suitably complex notion of agent, introduce a mechanism for the controlled execution of a protocol run and formalize it in terms of labeled transition systems. Finally, we show how the general problem of constructing defenses can be addressed systematically within the paradigm.
doi_str_mv 10.1109/CTS.2012.6261087
format conference_proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6261087</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6261087</ieee_id><sourcerecordid>6261087</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-c06de071ffe696c64a1dca29a21accbf456adcfeffa44710070bb20c7377134d3</originalsourceid><addsrcrecordid>eNpFj01LxDAURSMiqOPsBTf5A63vJZmkdTcUv2DAhd0PafIyRNq0pFWYf--AA97N5Wwu5zJ2j1AiQv3YtJ-lABSlFhqhMhfsFpU2EmUF5vIfcHPN1vP8BaeYCkHLG_a0TZzST8xjGigttueTzdbHw8DDmLmnQMnHdOAzue8clyOf8riMbuznO3YVbD_T-twr1r48t81bsft4fW-2uyLWsBQOtCcwGALpWjutLHpnRW0FWue6oDbaehcoBKuUwZMZdJ0AZ6QxKJWXK_bwNxuJaD_lONh83J-vyl8o2khu</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>An environmental paradigm for defending security protocols</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Fiazza, Maria-Camilla ; Peroli, Michele ; Vigano, Luca</creator><creatorcontrib>Fiazza, Maria-Camilla ; Peroli, Michele ; Vigano, Luca</creatorcontrib><description>In scenarios with multiple non-collaborating attackers, interference between simultaneous attack procedures can emerge. Interference has a wide range of consequences: it demands network models capable of supporting concurrence, it marks an unexpected complexity of the network environment, it can be exploited to construct partial defenses for vulnerable security protocols. In this paper, we describe a paradigm shift to support the investigation of interference with applications to constructing executable defenses for vulnerable protocols. We recruit tools from fields, such as AI and robotics, that have a suitably complex notion of agent, introduce a mechanism for the controlled execution of a protocol run and formalize it in terms of labeled transition systems. Finally, we show how the general problem of constructing defenses can be addressed systematically within the paradigm.</description><identifier>ISBN: 1467313815</identifier><identifier>ISBN: 9781467313810</identifier><identifier>EISBN: 1467313807</identifier><identifier>EISBN: 1467313823</identifier><identifier>EISBN: 9781467313827</identifier><identifier>EISBN: 9781467313803</identifier><identifier>DOI: 10.1109/CTS.2012.6261087</identifier><language>eng</language><publisher>IEEE</publisher><subject>agent controller ; Cognition ; Collaboration ; competitive attacker ; Complexity theory ; Context modeling ; defense ; Interference ; Non-collaborating attackers ; protocol-as-environment ; Protocols ; Security</subject><ispartof>2012 International Conference on Collaboration Technologies and Systems (CTS), 2012, p.427-438</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6261087$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6261087$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Fiazza, Maria-Camilla</creatorcontrib><creatorcontrib>Peroli, Michele</creatorcontrib><creatorcontrib>Vigano, Luca</creatorcontrib><title>An environmental paradigm for defending security protocols</title><title>2012 International Conference on Collaboration Technologies and Systems (CTS)</title><addtitle>CTS</addtitle><description>In scenarios with multiple non-collaborating attackers, interference between simultaneous attack procedures can emerge. Interference has a wide range of consequences: it demands network models capable of supporting concurrence, it marks an unexpected complexity of the network environment, it can be exploited to construct partial defenses for vulnerable security protocols. In this paper, we describe a paradigm shift to support the investigation of interference with applications to constructing executable defenses for vulnerable protocols. We recruit tools from fields, such as AI and robotics, that have a suitably complex notion of agent, introduce a mechanism for the controlled execution of a protocol run and formalize it in terms of labeled transition systems. Finally, we show how the general problem of constructing defenses can be addressed systematically within the paradigm.</description><subject>agent controller</subject><subject>Cognition</subject><subject>Collaboration</subject><subject>competitive attacker</subject><subject>Complexity theory</subject><subject>Context modeling</subject><subject>defense</subject><subject>Interference</subject><subject>Non-collaborating attackers</subject><subject>protocol-as-environment</subject><subject>Protocols</subject><subject>Security</subject><isbn>1467313815</isbn><isbn>9781467313810</isbn><isbn>1467313807</isbn><isbn>1467313823</isbn><isbn>9781467313827</isbn><isbn>9781467313803</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2012</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNpFj01LxDAURSMiqOPsBTf5A63vJZmkdTcUv2DAhd0PafIyRNq0pFWYf--AA97N5Wwu5zJ2j1AiQv3YtJ-lABSlFhqhMhfsFpU2EmUF5vIfcHPN1vP8BaeYCkHLG_a0TZzST8xjGigttueTzdbHw8DDmLmnQMnHdOAzue8clyOf8riMbuznO3YVbD_T-twr1r48t81bsft4fW-2uyLWsBQOtCcwGALpWjutLHpnRW0FWue6oDbaehcoBKuUwZMZdJ0AZ6QxKJWXK_bwNxuJaD_lONh83J-vyl8o2khu</recordid><startdate>201205</startdate><enddate>201205</enddate><creator>Fiazza, Maria-Camilla</creator><creator>Peroli, Michele</creator><creator>Vigano, Luca</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201205</creationdate><title>An environmental paradigm for defending security protocols</title><author>Fiazza, Maria-Camilla ; Peroli, Michele ; Vigano, Luca</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-c06de071ffe696c64a1dca29a21accbf456adcfeffa44710070bb20c7377134d3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2012</creationdate><topic>agent controller</topic><topic>Cognition</topic><topic>Collaboration</topic><topic>competitive attacker</topic><topic>Complexity theory</topic><topic>Context modeling</topic><topic>defense</topic><topic>Interference</topic><topic>Non-collaborating attackers</topic><topic>protocol-as-environment</topic><topic>Protocols</topic><topic>Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Fiazza, Maria-Camilla</creatorcontrib><creatorcontrib>Peroli, Michele</creatorcontrib><creatorcontrib>Vigano, Luca</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Fiazza, Maria-Camilla</au><au>Peroli, Michele</au><au>Vigano, Luca</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>An environmental paradigm for defending security protocols</atitle><btitle>2012 International Conference on Collaboration Technologies and Systems (CTS)</btitle><stitle>CTS</stitle><date>2012-05</date><risdate>2012</risdate><spage>427</spage><epage>438</epage><pages>427-438</pages><isbn>1467313815</isbn><isbn>9781467313810</isbn><eisbn>1467313807</eisbn><eisbn>1467313823</eisbn><eisbn>9781467313827</eisbn><eisbn>9781467313803</eisbn><abstract>In scenarios with multiple non-collaborating attackers, interference between simultaneous attack procedures can emerge. Interference has a wide range of consequences: it demands network models capable of supporting concurrence, it marks an unexpected complexity of the network environment, it can be exploited to construct partial defenses for vulnerable security protocols. In this paper, we describe a paradigm shift to support the investigation of interference with applications to constructing executable defenses for vulnerable protocols. We recruit tools from fields, such as AI and robotics, that have a suitably complex notion of agent, introduce a mechanism for the controlled execution of a protocol run and formalize it in terms of labeled transition systems. Finally, we show how the general problem of constructing defenses can be addressed systematically within the paradigm.</abstract><pub>IEEE</pub><doi>10.1109/CTS.2012.6261087</doi><tpages>12</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 1467313815
ispartof 2012 International Conference on Collaboration Technologies and Systems (CTS), 2012, p.427-438
issn
language eng
recordid cdi_ieee_primary_6261087
source IEEE Electronic Library (IEL) Conference Proceedings
subjects agent controller
Cognition
Collaboration
competitive attacker
Complexity theory
Context modeling
defense
Interference
Non-collaborating attackers
protocol-as-environment
Protocols
Security
title An environmental paradigm for defending security protocols
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-31T06%3A54%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=An%20environmental%20paradigm%20for%20defending%20security%20protocols&rft.btitle=2012%20International%20Conference%20on%20Collaboration%20Technologies%20and%20Systems%20(CTS)&rft.au=Fiazza,%20Maria-Camilla&rft.date=2012-05&rft.spage=427&rft.epage=438&rft.pages=427-438&rft.isbn=1467313815&rft.isbn_list=9781467313810&rft_id=info:doi/10.1109/CTS.2012.6261087&rft.eisbn=1467313807&rft.eisbn_list=1467313823&rft.eisbn_list=9781467313827&rft.eisbn_list=9781467313803&rft_dat=%3Cieee_6IE%3E6261087%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i90t-c06de071ffe696c64a1dca29a21accbf456adcfeffa44710070bb20c7377134d3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6261087&rfr_iscdi=true