Timing attacks in security protocols: Symbolic framework and proof techniques

被引:9
|
作者
Cheval, Vincent [1 ,2 ]
Cortier, Véronique [1 ]
机构
[1] LORIA, CNRS, France
[2] School of Computing, University of Kent, United Kingdom
基金
欧洲研究理事会;
关键词
Calculations - Network security - Computability and decidability;
D O I
10.1007/978-3-662-46666-7_15
中图分类号
学科分类号
摘要
We propose a framework for timing attacks, based on (a variant of) the applied-pi calculus. Since many privacy properties, as well as strong secrecy and game-based security properties, are stated as process equivalences, we focus on (time) trace equivalence. We show that actually, considering timing attacks does not add any complexity: time trace equivalence can be reduced to length trace equivalence, where the attacker no longer has access to execution times but can still compare the length of messages. We therefore deduce from a previous decidability result for length equivalence that time trace equivalence is decidable for bounded processes and the standard cryptographic primitives. As an application, we study several protocols that aim for privacy. In particular, we (automatically) detect an existing timing attack against the biometric passport and new timing attacks against the Private Authentication protocol. © Springer-Verlag Berlin Heidelberg 2015.
引用
收藏
页码:280 / 299
相关论文
共 50 条
  • [1] Uncovering attacks on security protocols
    Yang, W
    Third International Conference on Information Technology and Applications, Vol 2, Proceedings, 2005, : 572 - 575
  • [2] Symbolic approach to the analysis of security protocols
    Lafrance, S
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2004, 10 (09) : 1156 - 1198
  • [3] A method for symbolic analysis of security protocols
    Boreale, M
    Buscemi, MG
    THEORETICAL COMPUTER SCIENCE, 2005, 338 (1-3) : 393 - 425
  • [4] Detecting collusion attacks in security protocols
    Chen, QF
    Chen, YPP
    Zhang, SC
    Zhang, CQ
    FRONTIERS OF WWW RESEARCH AND DEVELOPMENT - APWEB 2006, PROCEEDINGS, 2006, 3841 : 297 - 306
  • [5] Desynchronization attacks on RFID security protocols
    Deng, M. (dmlei2003@163.com), 1600, Universitas Ahmad Dahlan (11):
  • [6] Analysis of Laravel Framework Security Techniques Against Web Application Attacks
    Vanderlei, Igor
    Araujo, Jean
    Rocha, Rodrigo
    Silva, Gabriel
    Pacheco, Felipe
    Dantas, Jamilson
    PROCEEDINGS OF 2021 16TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI'2021), 2021,
  • [7] Resource and timing aspects of security protocols
    Urquiza, Abraao Aires
    Alturki, Musab A.
    Kirigin, Tajana Ban
    Kanovich, Max
    Nigam, Vivek
    Scedrov, Andre
    Talcott, Carolyn
    JOURNAL OF COMPUTER SECURITY, 2021, 29 (03) : 299 - 340
  • [8] A generic model for symbolic analyzing security protocols
    Gu, YG
    Fu, YX
    Li, Y
    Dong, XJ
    Fifth International Conference on Computer and Information Technology - Proceedings, 2005, : 680 - 684
  • [9] OFMC: A symbolic model checker for security protocols
    Basin D.
    Mödersheim S.
    Viganò L.
    International Journal of Information Security, 2005, 4 (3) : 181 - 208
  • [10] Simulation of Security Protocols based on Scenarios of Attacks
    Jakubowska, Gizela
    Dembinski, Piotr
    Penczek, Wojciech
    Szreter, Maciej
    FUNDAMENTA INFORMATICAE, 2009, 93 (1-3) : 185 - 203