Traditionally security protocol analysis relies on a single Dolev-Yao attacker. This type of attacker is so powerful that overall attack power does not change if additional attackers cooperate. In this paper, we take a fundamentally different approach and investigate the case of multiple non-collaborating attackers. We show how non-collaboration between attackers gives rise to interference between ongoing attacks and that it is possible to actively exploit attack interference to mitigate security breaches and provide partial protection to weak protocols.

Attack Interference: A Path to Defending Security Protocols

FIAZZA, Maria Camilla;PEROLI, Michele;VIGANO', Luca
2012-01-01

Abstract

Traditionally security protocol analysis relies on a single Dolev-Yao attacker. This type of attacker is so powerful that overall attack power does not change if additional attackers cooperate. In this paper, we take a fundamentally different approach and investigate the case of multiple non-collaborating attackers. We show how non-collaboration between attackers gives rise to interference between ongoing attacks and that it is possible to actively exploit attack interference to mitigate security breaches and provide partial protection to weak protocols.
2012
Security Protocols; Non-collaborative attackers
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11562/915585
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact