Loading…
Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version)
Security protocols are often found to be flawed after their deployment. We present an approach that aims at the neutralization or mitigation of the attacks to flawed protocols: it avoids the complete dismissal of the interested protocol and allows honest agents to continue to use it until a correcte...
Saved in:
Published in: | arXiv.org 2014-05 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | |
container_issue | |
container_start_page | |
container_title | arXiv.org |
container_volume | |
creator | Peroli, Michele Viganò, Luca Zavatteri, Matteo |
description | Security protocols are often found to be flawed after their deployment. We present an approach that aims at the neutralization or mitigation of the attacks to flawed protocols: it avoids the complete dismissal of the interested protocol and allows honest agents to continue to use it until a corrected version is released. Our approach is based on the knowledge of the network topology, which we model as a graph, and on the consequent possibility of creating an interference to an ongoing attack of a Dolev-Yao attacker, by means of non-collaboration actuated by ad-hoc benign attackers that play the role of network guardians. Such guardians, positioned in strategical points of the network, have the task of monitoring the messages in transit and discovering at runtime, through particular types of inference, whether an attack is ongoing, interrupting the run of the protocol in the positive case. We study not only how but also where we can attempt to defend flawed security protocols: we investigate the different network topologies that make security protocol defense feasible and illustrate our approach by means of concrete examples. |
format | article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2084123054</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2084123054</sourcerecordid><originalsourceid>FETCH-proquest_journals_20841230543</originalsourceid><addsrcrecordid>eNqNjNEKgjAYRkcQJOU7DLqpC2FtWt5GKV5FUNSlLP0lTfbXNrPevhE9QFeHj3P4BsTjQiyCOOR8RHxjGsYYX654FAmPlDtUQYFtKy-opa2fQNfWyuIG2lCpSpph_-X5ChqoRbqFCtxOW9lDSQ9QdLq2b7rXaNEdGTpLXtYVTp7cSY1qPiHDSrYG_B_HZJomx00W3DU-OjA2b7DTyqmcszhccMGiUPxXfQDAiEWU</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2084123054</pqid></control><display><type>article</type><title>Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version)</title><source>Publicly Available Content Database</source><creator>Peroli, Michele ; Viganò, Luca ; Zavatteri, Matteo</creator><creatorcontrib>Peroli, Michele ; Viganò, Luca ; Zavatteri, Matteo</creatorcontrib><description>Security protocols are often found to be flawed after their deployment. We present an approach that aims at the neutralization or mitigation of the attacks to flawed protocols: it avoids the complete dismissal of the interested protocol and allows honest agents to continue to use it until a corrected version is released. Our approach is based on the knowledge of the network topology, which we model as a graph, and on the consequent possibility of creating an interference to an ongoing attack of a Dolev-Yao attacker, by means of non-collaboration actuated by ad-hoc benign attackers that play the role of network guardians. Such guardians, positioned in strategical points of the network, have the task of monitoring the messages in transit and discovering at runtime, through particular types of inference, whether an attack is ongoing, interrupting the run of the protocol in the positive case. We study not only how but also where we can attempt to defend flawed security protocols: we investigate the different network topologies that make security protocol defense feasible and illustrate our approach by means of concrete examples.</description><identifier>EISSN: 2331-8422</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Collaboration ; Knowledge management ; Network topologies ; Protocol ; Protocol (computers) ; Security</subject><ispartof>arXiv.org, 2014-05</ispartof><rights>2014. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/2084123054?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>777,781,25734,36993,44571</link.rule.ids></links><search><creatorcontrib>Peroli, Michele</creatorcontrib><creatorcontrib>Viganò, Luca</creatorcontrib><creatorcontrib>Zavatteri, Matteo</creatorcontrib><title>Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version)</title><title>arXiv.org</title><description>Security protocols are often found to be flawed after their deployment. We present an approach that aims at the neutralization or mitigation of the attacks to flawed protocols: it avoids the complete dismissal of the interested protocol and allows honest agents to continue to use it until a corrected version is released. Our approach is based on the knowledge of the network topology, which we model as a graph, and on the consequent possibility of creating an interference to an ongoing attack of a Dolev-Yao attacker, by means of non-collaboration actuated by ad-hoc benign attackers that play the role of network guardians. Such guardians, positioned in strategical points of the network, have the task of monitoring the messages in transit and discovering at runtime, through particular types of inference, whether an attack is ongoing, interrupting the run of the protocol in the positive case. We study not only how but also where we can attempt to defend flawed security protocols: we investigate the different network topologies that make security protocol defense feasible and illustrate our approach by means of concrete examples.</description><subject>Collaboration</subject><subject>Knowledge management</subject><subject>Network topologies</subject><subject>Protocol</subject><subject>Protocol (computers)</subject><subject>Security</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNqNjNEKgjAYRkcQJOU7DLqpC2FtWt5GKV5FUNSlLP0lTfbXNrPevhE9QFeHj3P4BsTjQiyCOOR8RHxjGsYYX654FAmPlDtUQYFtKy-opa2fQNfWyuIG2lCpSpph_-X5ChqoRbqFCtxOW9lDSQ9QdLq2b7rXaNEdGTpLXtYVTp7cSY1qPiHDSrYG_B_HZJomx00W3DU-OjA2b7DTyqmcszhccMGiUPxXfQDAiEWU</recordid><startdate>20140527</startdate><enddate>20140527</enddate><creator>Peroli, Michele</creator><creator>Viganò, Luca</creator><creator>Zavatteri, Matteo</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20140527</creationdate><title>Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version)</title><author>Peroli, Michele ; Viganò, Luca ; Zavatteri, Matteo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_20841230543</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Collaboration</topic><topic>Knowledge management</topic><topic>Network topologies</topic><topic>Protocol</topic><topic>Protocol (computers)</topic><topic>Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Peroli, Michele</creatorcontrib><creatorcontrib>Viganò, Luca</creatorcontrib><creatorcontrib>Zavatteri, Matteo</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Peroli, Michele</au><au>Viganò, Luca</au><au>Zavatteri, Matteo</au><format>book</format><genre>document</genre><ristype>GEN</ristype><atitle>Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version)</atitle><jtitle>arXiv.org</jtitle><date>2014-05-27</date><risdate>2014</risdate><eissn>2331-8422</eissn><abstract>Security protocols are often found to be flawed after their deployment. We present an approach that aims at the neutralization or mitigation of the attacks to flawed protocols: it avoids the complete dismissal of the interested protocol and allows honest agents to continue to use it until a corrected version is released. Our approach is based on the knowledge of the network topology, which we model as a graph, and on the consequent possibility of creating an interference to an ongoing attack of a Dolev-Yao attacker, by means of non-collaboration actuated by ad-hoc benign attackers that play the role of network guardians. Such guardians, positioned in strategical points of the network, have the task of monitoring the messages in transit and discovering at runtime, through particular types of inference, whether an attack is ongoing, interrupting the run of the protocol in the positive case. We study not only how but also where we can attempt to defend flawed security protocols: we investigate the different network topologies that make security protocol defense feasible and illustrate our approach by means of concrete examples.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | EISSN: 2331-8422 |
ispartof | arXiv.org, 2014-05 |
issn | 2331-8422 |
language | eng |
recordid | cdi_proquest_journals_2084123054 |
source | Publicly Available Content Database |
subjects | Collaboration Knowledge management Network topologies Protocol Protocol (computers) Security |
title | Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version) |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T22%3A56%3A49IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=document&rft.atitle=Non-collaborative%20Attackers%20and%20How%20and%20Where%20to%20Defend%20Flawed%20Security%20Protocols%20(Extended%20Version)&rft.jtitle=arXiv.org&rft.au=Peroli,%20Michele&rft.date=2014-05-27&rft.eissn=2331-8422&rft_id=info:doi/&rft_dat=%3Cproquest%3E2084123054%3C/proquest%3E%3Cgrp_id%3Ecdi_FETCH-proquest_journals_20841230543%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2084123054&rft_id=info:pmid/&rfr_iscdi=true |