首页> 外文会议>International security protocols workshop >Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version)
【24h】

Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version)

机译:非合作攻击者以及如何以及在何处防御有缺陷的安全协议(扩展版)

获取原文

摘要

Security protocols are often found to be flawed after their deployment. We present an approach that aims at the neutralization or mitigation of the attacks to flawed protocols: it avoids the complete dismissal of the interested protocol and allows honest agents to continue to use it until a corrected version is released. Our approach is based on the knowledge of the network topology, which we model as a graph, and on the consequent possibility of creating an interference to an ongoing attack of a Dolev-Yao attacker, by means of non-collaboration actuated by ad-hoc benign attackers that play the role of network guardians. Such guardians, positioned in strategical points of the network, have the task of monitoring the messages in transit and discovering at runtime, through particular types of inference, whether an attack is ongoing, interrupting the run of the protocol in the positive case. We study not only how but also where we can attempt to defend flawed security protocols: we investigate the different network topologies that make security protocol defense feasible and illustrate our approach by means of concrete examples.
机译:安全协议部署后通常会发现有缺陷。我们提出一种旨在中和或减轻对有缺陷协议的攻击的方法:它避免了对感兴趣协议的完全消除,并允许诚实的代理继续使用它,直到发布了正确的版本。我们的方法基于对网络拓扑的了解(我们将其建模为图形),并且基于通过ad-hoc激活的非协作方式对Dolev-Yao攻击者的持续攻击造成干扰的可能性扮演网络守护者角色的良性攻击者。此类监护人位于网络的战略要点,其任务是监视传输中的消息,并在运行时通过特定类型的推断来发现是否正在进行攻击,并在肯定的情况下中断协议的运行。我们不仅研究如何而且还尝试在何处尝试防御有缺陷的安全协议:我们研究使安全协议防御可行的不同网络拓扑,并通过具体示例说明我们的方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号