Defending Vulnerable Security Protocols by Means of Attack Interference in Non-collaborative Scenarios

التفاصيل البيبلوغرافية
العنوان: Defending Vulnerable Security Protocols by Means of Attack Interference in Non-collaborative Scenarios
المؤلفون: Luca Viganò, Michele Peroli, Maria Camilla Fiazza
المصدر: Frontiers in ICT, Vol 2 (2015)
بيانات النشر: Frontiers Media S.A., 2015.
سنة النشر: 2015
مصطلحات موضوعية: security protocols, Exploit, Computer Networks and Communications, Computer science, Security protocol analysis, Data_CODINGANDINFORMATIONTHEORY, Computer security, computer.software_genre, Interference (wave propagation), attacker personality, lcsh:QA75.5-76.95, Pre-play attack, Artificial Intelligence, Vulnerability (computing), attack interference, business.industry, Cryptographic protocol, 16. Peace & justice, Attack mitigation, Hardware and Architecture, ICT, non-collaborative attackers, lcsh:Electronic computers. Computer science, business, computer, Ciphertext-only attack, Software, Information Systems, Computer network
الوصف: In security protocol analysis, the traditional choice to consider a single Dolev–Yao attacker is supported by the fact that models with multiple collaborating Dolev–Yao attackers are reducible to models with one Dolev–Yao attacker. In this paper, we take a fundamentally different approach and investigate the case of multiple non-collaborating attackers. We formalize a framework for multi-attacker scenarios and show, through a detailed case study, that concurrent competitive attacks can interfere with each other. It is then possible to exploit interference to provide a form of defense to vulnerable protocols.
اللغة: English
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::50f98e39c4932b27b1c98bb9170a3643Test
http://journal.frontiersin.org/Journal/10.3389/fict.2015.00011/fullTest
حقوق: OPEN
رقم الانضمام: edsair.doi.dedup.....50f98e39c4932b27b1c98bb9170a3643
قاعدة البيانات: OpenAIRE