首页> 外文会议>Detection of Intrusions and Malware, and Vulnerability Assessment >VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges
【24h】

VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges

机译:VeriKey:用于公共密钥交换的动态证书验证系统

获取原文
获取原文并翻译 | 示例

摘要

This paper presents a novel framework to substantiate self-signed certificates in the absence of a trusted certificate authority. In particular, we aim to address the problem of web-based SSL man-in-the-middle attacks. This problem originates from the fact that public keys are distributed through insecure channels prior to encryption. Therefore, a man-in-the-middle attacker may substitute an arbitrary public key during the exchange process and compromise communication between a client and server. Typically, web clients (browsers) recognize this potential security breach and display warning prompts, but often to no avail as users simply accept the certificate since they lack the understanding of Public Key Infrastructures (PKIs) and the meaning of these warnings. In order to enhance the security of public key exchanges, we have devised an automated system to leverage one or more vantage points of a certificate from hosts that have distinct pathways to a remote server. That is, we have a set of distributed servers simultaneously retrieve the server's public key. By comparing the keys received by peers, we can identify any deviations and verify that an attacker has not compromised the link between a client and server. This is attributable to the fact that an attacker would have to compromise all paths between these vantage points and the server. Therefore, our technique greatly reduces the likelihood of a successful attack, and removes the necessity for human interaction.
机译:本文提出了一种新颖的框架,可以在没有受信任的证书颁发机构的情况下证实自签名证书。特别是,我们旨在解决基于Web的SSL中间人攻击的问题。此问题源于以下事实:在加密之前,公钥是通过不安全的渠道分发的。因此,中间人攻击者可能会在交换过程中替换任意公钥,从而损害客户端与服务器之间的通信。通常,Web客户端(浏览器)会认识到此潜在的安全漏洞并显示警告提示,但由于用户缺乏对公钥基础结构(PKI)的理解以及这些警告的含义,因此用户仅接受证书就无济于事。为了增强公共密钥交换的安全性,我们设计了一种自动化系统,以利用来自具有不同路径的主机的证书的一个或多个优势点,这些主机具有通往远程服务器的独特路径。也就是说,我们有一组分布式服务器,可同时检索服务器的公共密钥。通过比较对等方收到的密钥,我们可以识别出任何偏差并验证攻击者没有破坏客户端与服务器之间的链接。这归因于以下事实:攻击者将不得不破坏这些优势点和服务器之间的所有路径。因此,我们的技术大大降低了成功攻击的可能性,并且消除了人机交互的必要性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号