Traditionally security protocol analysis relies on a single Dolev-Yao attacker. This type of attacker is so powerful that overall attack power does not change if additional attackers cooperate. In this paper, we take a fundamentally different approach and investigate the case of multiple non-collaborating attackers. We show how non-collaboration between attackers gives rise to interference between ongoing attacks and that it is possible to actively exploit attack interference to mitigate security breaches and provide partial protection to weak protocols.
Attack Interference: A Path to Defending Security Protocols
FIAZZA, Maria Camilla;PEROLI, Michele;VIGANO', Luca
2012-01-01
Abstract
Traditionally security protocol analysis relies on a single Dolev-Yao attacker. This type of attacker is so powerful that overall attack power does not change if additional attackers cooperate. In this paper, we take a fundamentally different approach and investigate the case of multiple non-collaborating attackers. We show how non-collaboration between attackers gives rise to interference between ongoing attacks and that it is possible to actively exploit attack interference to mitigate security breaches and provide partial protection to weak protocols.File in questo prodotto:
Non ci sono file associati a questo prodotto.
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.