DocumentCode :
1825821
Title :
Feasibility of multi-protocol attacks
Author :
Cremers, Cas
Author_Institution :
Dept. of Math. & Comput. Sci., Eindhoven Univ. of Technol., Netherlands
fYear :
2006
fDate :
20-22 April 2006
Abstract :
Formal modeling and verification of security protocols typically assumes that a protocol is executed in isolation, without other protocols sharing the network. We investigate the existence of multi-protocol attacks on protocols described in literature. Given two or more protocols, that share key structures and are executed in the same environment, are new attacks possible? Out of 30 protocols from literature, we find that 23 are vulnerable to multi-protocol attacks. We identify two likely attack patterns and sketch a tagging scheme to prevent multi-protocol attacks.
Keywords :
formal verification; protocols; security of data; telecommunication security; formal modeling; formal verification; multiprotocol attack; security protocol; tagging scheme; Availability; Computer science; Content addressable storage; Isolation technology; Mathematics; Protocols; Scalability; Security; Sufficient conditions; Tagging;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Availability, Reliability and Security, 2006. ARES 2006. The First International Conference on
Print_ISBN :
0-7695-2567-9
Type :
conf
DOI :
10.1109/ARES.2006.63
Filename :
1625322
Link To Document :
بازگشت