Key Agreement Over Inter-Process Communication
نویسندگان
چکیده
Today’s computer is often infected by malwares and conventional communication channels such as inter-process (IPC) are attractive attack surface for attackers because important information user’s personal data passwords transmitted between processes over IPC. In addition, there no other protection than the access control mechanism provided underlying OS, but it not always sufficient. To improve situation, this paper proposes a key agreement protocol using network socket, which one of IPC methods. Our provides means legitimate to cryptographically communicate We use an uncertain channel secure we found that behaves due process scheduling OS. The proposed based on random number sharing messages attacker probabilistically fails obtain detection who interrupts protocol. against impersonates processes. experiment behavior actual device confirm our achieves 128-bit security in realistic execution time within 8.5 ms. best knowledge, proposal first countermeasure with cryptographic strength under reasonable assumptions.
منابع مشابه
Communication-Efficient Group Key Agreement
Traditionally, research in secure group key agreement focuses on minimizing the computational overhead for cryptographic operations, and minimizing the communication overhead and the number of protocol rounds is of secondary concern. The dramatic increase in computation power that we witnessed during the past years exposed network delay in WANs as the primary culprit for a negative performance ...
متن کاملKey agreement over a radio link ∗
We present a simple, and yet powerful, technique for key establishment over a radio link in peer-to-peer networks. Our approach is based on the Diffie-Hellman key agreement protocol. This protocol is known to be vulnerable to the “man-in-the-middle” attack if two users involved in the protocol share no authenticated information about each other (e.g., public keys) prior to the protocol executio...
متن کاملOn Key Agreement and Conference Key Agreement
An attack is demonstrated on a previously proposed class of key agreement protocols. Analysis of the attack reveals that a small change in the construction of the protocols is suucient to prevent the attack. The insight gained allows a generalisation of the class to a new design for conference key agreement protocols.
متن کاملOn Global-Time and Inter-process Communication
How should time be represented in models for inter-process com-munication? The global-time axiom implies that all events can be represented by intervals on one time-axis. Its use simpliies the analysis of protocols and allows for intuitive proofs of their properties. On the other hand,some researchers believe it is too strong an assumption which should be avoided. In order to suggest an answer ...
متن کاملCDMA Technique with Inter - process Communication
A novel implementation of Inter process communication in CDMA NOC is proposed. In this study, the orthogonality properties of a Walsh code are used to route data packets between the IP-Cores.The asynchronous circuit design with combinational logic (Gate level design) is used for transmission and receiving circuits, along with ip-cores and reduces the processing time and resource utilization. Th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2021
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2021.3117337