首页> 外文期刊>Journal of computer security >Time, computational complexity, and probability in the analysis of distance-bounding protocols
【24h】

Time, computational complexity, and probability in the analysis of distance-bounding protocols

机译:距离限定协议分析中的时间,计算复杂性和概率

获取原文
获取原文并翻译 | 示例

摘要

Many security protocols rely on the assumptions on the physical properties in which its protocol sessions will be carried out. For instance, Distance Bounding Protocols take into account the round trip time of messages and the transmission velocity to infer an upper bound of the distance between two agents. We classify such security protocols as Cyber-Physical. Time plays a key role in design and analysis of many of these protocols. This paper investigates the foundational differences and the impacts on the analysis when using models with discrete time and models with dense time. We show that there are attacks that can be found by models using dense time, but not when using discrete time. We illustrate this with an attack that can be carried out on most Distance Bounding Protocols. In this attack, one exploits the execution delay of instructions during one clock cycle to convince a verifier that he is in a location different from his actual position. We additionally present a probabilistic analysis of this novel attack. As a formal model for representing and analyzing Cyber-Physical properties, we propose a Multiset Rewriting model with dense time suitable for specifying cyber-physical security protocols. We introduce Circle-Configurations and show that they can be used to symbolically solve the reachability problem for our model, and show that for the important class of balanced theories the reachability problem is PSPACE-complete. We also show how our model can be implemented using the computational rewriting tool Maude, the machinery that automatically searches for such attacks.
机译:许多安全协议依赖于将执行其协议会话的物理属性的假设。例如,距离边界协议考虑了消息的往返时间和传输速度,以推断两个代理之间距离的上限。我们将这些安全协议分类为网络物理。时间在许多方案的设计和分析中发挥着关键作用。本文调查了在使用具有密集时间的离散时间和模型的模型时对分析的基础差异和影响。我们表明,使用致密时间可以通过模型找到攻击,但在使用离散时间时,模型可以找到。我们用攻击说明了这一点,可以在大多数距离边界协议上进行。在这次攻击中,一个人在一个时钟周期期间利用指令的执行延迟,以说服他在与他实际位置不同的位置。我们还呈现了对这部小型攻击的概率分析。作为代表和分析网络物理性质的正式模型,我们提出了一种具有密集时间的多站本重写模型,适合指定网络物理安全协议。我们介绍圆形配置,并显示它们可用于象征性地解决我们的模型的可达性问题,并表明对于重要的平衡理论,可达性问题是PSPACE完整的。我们还展示了如何使用计算重写工具Maude,自动搜索此类攻击的机器来实现我们的模型。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号