Securing Statically-verified Communications Protocols Against Timing Attacks

نویسندگان

  • Mikael Buchholtz
  • Stephen Gilmore
  • Jane Hillston
  • Flemming Nielson
چکیده

We present a federated analysis of communication protocols which considers both security properties and timing. These are not entirely independent observations of a protocol; by using timing observations of an executing protocol it is possible to calculate encryption keys which were intended to be secret or to deduce derived information about the nature of the communication even in the presence of unbreakable encryption. Our analysis is based on expressing the protocol as a high-level model and deriving from this process calculus models analysable by the Imperial PEPA Compiler and the LySatool. 1 Email: [email protected] 2 Email: [email protected] 3 Email: [email protected] 4 Email: [email protected] This is a preliminary version. The final version will be published in Electronic Notes in Theoretical Computer Science URL: www.elsevier.nl/locate/entcs Buchholtz, Gilmore, Hillston and Nielson

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing AODV routing protocol against the black hole attack using Firefly algorithm

Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...

متن کامل

Attacks Against Virtual Coordinate System Based Routing in Wireless Sensor Networks

Wireless sensornet designs have evolved in recent years, from primarily focusing on data collection to more sophisticated tasks such as data centric storage [7]. Likewise, the requirements on the network support have also changed, from the basic many-to-one and one-to-many communications to more sophisticated point-to-point communications. To address the unique challenges for point-to-point rou...

متن کامل

Improving Tor security against timing and traffic analysis attacks with fair randomization

The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web browsing. Despite the advantages, the low latency also makes Tor insecure against timing and tr...

متن کامل

A Proactive Distributed Denial of Service Protection Framework

Securing communication networks against distributed denial of service attacks (DDoS) is still one of the most challenging network security issues. We propose a framework to protect network routers and hosts against resource starvation caused by DDoS attacks. We pro-actively build overlay groups of neighboring enhanced routers according to current traffic patterns. During ongoing attacks, the fr...

متن کامل

Securing Wireless Broadcast Communications against Internal Attacks

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 CHAPTER

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Electr. Notes Theor. Comput. Sci.

دوره 128  شماره 

صفحات  -

تاریخ انتشار 2005