ATTACK INTERFERENCE IN NON-COLLABORATIVE SCENARIOS FOR SECURITY PROTOCOL ANALYSIS

M.-Camilla Fiazza, Michele Peroli, Luca Viganò

2011

Abstract

In security protocol analysis, the traditional choice to consider a single Dolev-Yao attacker is supported by the fact that models with multiple collaborating Dolev-Yao attackers have been shown to be reducible to models with one Dolev-Yao attacker. In this paper, we take a fundamentally different approach and investigate the case of multiple non-collaborating attackers. After formalizing the framework for multi-attacker scenarios, we show with a case study that concurrent competitive attacks can interfere with each other. We then present a new strategy to defend security protocols, based on active exploitation of attack interference. The paper can be seen as providing two proof-of-concept results: (i) it is possible to exploit interference to mitigate protocol vulnerabilities, thus providing a form of protection to protocols; (ii) the search for defense strategies requires scenarios with at least two attackers.

References

  1. Abadi, M., Blanchet, B., and Comon-Lundh, H. (2009). Models and proofs of protocol security: A progress report. In Proceedings of CAV'09, LNCS 5643, pages 35-49. Springer.
  2. Abadi, M., Blanchet, B., and Comon-Lundh, H. (2009). Models and proofs of protocol security: A progress report. In Proceedings of CAV'09, LNCS 5643, pages 35-49. Springer.
  3. Arsac, W., Bella, G., Chantry, X., and Compagna, L. (2009). Validating Security Protocols under the General Attacker. In Proceedings of ARSPA-WITS 2009, LNCS 5511, pages 34-51. Springer.
  4. Arsac, W., Bella, G., Chantry, X., and Compagna, L. (2009). Validating Security Protocols under the General Attacker. In Proceedings of ARSPA-WITS 2009, LNCS 5511, pages 34-51. Springer.
  5. Basin, D., Capkun, S., Schaller, P., and Schmidt, B. (2009). Let's get physical: Models and methods for real-world security protocols. In Proceedings of TPHOLs'09, LNCS 5674, pages 1-22. Springer.
  6. Basin, D., Capkun, S., Schaller, P., and Schmidt, B. (2009). Let's get physical: Models and methods for real-world security protocols. In Proceedings of TPHOLs'09, LNCS 5674, pages 1-22. Springer.
  7. Basin, D. and Cremers, C. (2010). Modeling and analyzing security in the presence of compromising adversaries. In Proceedings of ESORICS 2010, LNCS 6345, pages 340-356. Springer.
  8. Basin, D. and Cremers, C. (2010). Modeling and analyzing security in the presence of compromising adversaries. In Proceedings of ESORICS 2010, LNCS 6345, pages 340-356. Springer.
  9. Bella, G., Bistarelli, S., and Massacci, F. (2003). A protocol's life after attacks. In Proceedings of 11th International Workshop on Security Protocols, LNCS 3364, pages 3-18. Springer.
  10. Bella, G., Bistarelli, S., and Massacci, F. (2003). A protocol's life after attacks. In Proceedings of 11th International Workshop on Security Protocols, LNCS 3364, pages 3-18. Springer.
  11. Bella, G., Bistarelli, S., and Massacci, F. (2008). Retaliation against protocol attacks. Journal of Information Assurance and Security, 3:313-325.
  12. Bella, G., Bistarelli, S., and Massacci, F. (2008). Retaliation against protocol attacks. Journal of Information Assurance and Security, 3:313-325.
  13. Boyd, C. and Mathuria, A. (2003). Protocols for Authentication and Key Establishment. Springer.
  14. Boyd, C. and Mathuria, A. (2003). Protocols for Authentication and Key Establishment. Springer.
  15. Caleiro, C., Viganò, L., and Basin, D. (2005). Metareasoning about security protocols using distributed temporal logic. Electronic Notes in Theoretical Computer Science, 125(1):67-89.
  16. Caleiro, C., Viganò, L., and Basin, D. (2005). Metareasoning about security protocols using distributed temporal logic. Electronic Notes in Theoretical Computer Science, 125(1):67-89.
  17. Caleiro, C., Viganò, L., and Basin, D. (2006). On the semantics of Alice & Bob specifications of security protocols. Theoretical Computer Science, 367(1-2):88 - 122.
  18. Caleiro, C., Viganò, L., and Basin, D. (2006). On the semantics of Alice & Bob specifications of security protocols. Theoretical Computer Science, 367(1-2):88 - 122.
  19. Comon-Lundh, H. and Cortier, V. (2003). Security properties: two agents are sufficient. In Proceedings of ESOP'2003, LNCS 2618, pages 99-113. Springer.
  20. Comon-Lundh, H. and Cortier, V. (2003). Security properties: two agents are sufficient. In Proceedings of ESOP'2003, LNCS 2618, pages 99-113. Springer.
  21. Dilloway, C. and Lowe, G. (2007). On the specification of secure channels. In Proceedings of WITS'07.
  22. Dilloway, C. and Lowe, G. (2007). On the specification of secure channels. In Proceedings of WITS'07.
  23. Dolev, D. and Yao, A. C. (1983). On the security of public key protocols. IEEE Trans. Inform. Theory, 29(2):198-208.
  24. Dolev, D. and Yao, A. C. (1983). On the security of public key protocols. IEEE Trans. Inform. Theory, 29(2):198-208.
  25. Fiazza, M. C., Peroli, M., and Viganò, L. (2011). Attack Interference in Non-Collaborative Scenarios for Security Protocol Analysis (extended version). Available at www.arxiv.org.
  26. Fiazza, M. C., Peroli, M., and Viganò, L. (2011). Attack Interference in Non-Collaborative Scenarios for Security Protocol Analysis (extended version). Available at www.arxiv.org.
  27. Kamil, A. and Lowe, G. (2010). Specifying and modelling secure channels in strand spaces. In Proceedings of FAST'09, LNCS 5983, pages 233-247. Springer.
  28. Kamil, A. and Lowe, G. (2010). Specifying and modelling secure channels in strand spaces. In Proceedings of FAST'09, LNCS 5983, pages 233-247. Springer.
  29. Millen, J. K. and Denker, G. (2002). Capsl and mucapsl. Journal of Telecommunications and Information Technology, 4:16-27.
  30. Millen, J. K. and Denker, G. (2002). Capsl and mucapsl. Journal of Telecommunications and Information Technology, 4:16-27.
  31. Mödersheim, S., Viganò, L., and Basin, D. A. (2010). Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols. Journal of Computer Security, 18(4):575-618.
  32. Mödersheim, S., Viganò, L., and Basin, D. A. (2010). Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols. Journal of Computer Security, 18(4):575-618.
  33. Schaller, P., Schmidt, B., Basin, D., and Capkun, S. (2009). Modeling and verifying physical properties of security protocols for wireless networks. In Proceedings of CSF'09. IEEE Computer Society.
  34. Schaller, P., Schmidt, B., Basin, D., and Capkun, S. (2009). Modeling and verifying physical properties of security protocols for wireless networks. In Proceedings of CSF'09. IEEE Computer Society.
  35. Syverson, P., Meadows, C., and Cervesato, I. (2000). Dolev-Yao is no better than Machiavelli. In Proceedings of WITS'00, pages 87-92.
  36. Syverson, P., Meadows, C., and Cervesato, I. (2000). Dolev-Yao is no better than Machiavelli. In Proceedings of WITS'00, pages 87-92.
Download


Paper Citation


in Harvard Style

Fiazza M., Peroli M. and Viganò L. (2011). ATTACK INTERFERENCE IN NON-COLLABORATIVE SCENARIOS FOR SECURITY PROTOCOL ANALYSIS . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011) ISBN 978-989-8425-71-3, pages 144-156. DOI: 10.5220/0003516801440156


in Harvard Style

Fiazza M., Peroli M. and Viganò L. (2011). ATTACK INTERFERENCE IN NON-COLLABORATIVE SCENARIOS FOR SECURITY PROTOCOL ANALYSIS . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011) ISBN 978-989-8425-71-3, pages 144-156. DOI: 10.5220/0003516801440156


in Bibtex Style

@conference{secrypt11,
author={M.-Camilla Fiazza and Michele Peroli and Luca Viganò},
title={ATTACK INTERFERENCE IN NON-COLLABORATIVE SCENARIOS FOR SECURITY PROTOCOL ANALYSIS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)},
year={2011},
pages={144-156},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003516801440156},
isbn={978-989-8425-71-3},
}


in Bibtex Style

@conference{secrypt11,
author={M.-Camilla Fiazza and Michele Peroli and Luca Viganò},
title={ATTACK INTERFERENCE IN NON-COLLABORATIVE SCENARIOS FOR SECURITY PROTOCOL ANALYSIS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)},
year={2011},
pages={144-156},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003516801440156},
isbn={978-989-8425-71-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)
TI - ATTACK INTERFERENCE IN NON-COLLABORATIVE SCENARIOS FOR SECURITY PROTOCOL ANALYSIS
SN - 978-989-8425-71-3
AU - Fiazza M.
AU - Peroli M.
AU - Viganò L.
PY - 2011
SP - 144
EP - 156
DO - 10.5220/0003516801440156


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)
TI - ATTACK INTERFERENCE IN NON-COLLABORATIVE SCENARIOS FOR SECURITY PROTOCOL ANALYSIS
SN - 978-989-8425-71-3
AU - Fiazza M.
AU - Peroli M.
AU - Viganò L.
PY - 2011
SP - 144
EP - 156
DO - 10.5220/0003516801440156