Securing Statically-verified Communications Protocols Against Timing Attacks
نویسندگان
چکیده
We present a federated analysis of communication protocols which considers both security properties and timing. These are not entirely independent observations of a protocol; by using timing observations of an executing protocol it is possible to calculate encryption keys which were intended to be secret or to deduce derived information about the nature of the communication even in the presence of unbreakable encryption. Our analysis is based on expressing the protocol as a high-level model and deriving from this process calculus models analysable by the Imperial PEPA Compiler and the LySatool. 1 Email: [email protected] 2 Email: [email protected] 3 Email: [email protected] 4 Email: [email protected] This is a preliminary version. The final version will be published in Electronic Notes in Theoretical Computer Science URL: www.elsevier.nl/locate/entcs Buchholtz, Gilmore, Hillston and Nielson
منابع مشابه
Securing AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کاملAttacks Against Virtual Coordinate System Based Routing in Wireless Sensor Networks
Wireless sensornet designs have evolved in recent years, from primarily focusing on data collection to more sophisticated tasks such as data centric storage [7]. Likewise, the requirements on the network support have also changed, from the basic many-to-one and one-to-many communications to more sophisticated point-to-point communications. To address the unique challenges for point-to-point rou...
متن کاملImproving Tor security against timing and traffic analysis attacks with fair randomization
The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web browsing. Despite the advantages, the low latency also makes Tor insecure against timing and tr...
متن کاملA Proactive Distributed Denial of Service Protection Framework
Securing communication networks against distributed denial of service attacks (DDoS) is still one of the most challenging network security issues. We propose a framework to protect network routers and hosts against resource starvation caused by DDoS attacks. We pro-actively build overlay groups of neighboring enhanced routers according to current traffic patterns. During ongoing attacks, the fr...
متن کاملSecuring Wireless Broadcast Communications against Internal Attacks
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 CHAPTER
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Electr. Notes Theor. Comput. Sci.
دوره 128 شماره
صفحات -
تاریخ انتشار 2005