Timing attacks in security protocols: Symbolic framework and proof techniques

被引:9
|
作者
Cheval, Vincent [1 ,2 ]
Cortier, Véronique [1 ]
机构
[1] LORIA, CNRS, France
[2] School of Computing, University of Kent, United Kingdom
基金
欧洲研究理事会;
关键词
Calculations - Network security - Computability and decidability;
D O I
10.1007/978-3-662-46666-7_15
中图分类号
学科分类号
摘要
We propose a framework for timing attacks, based on (a variant of) the applied-pi calculus. Since many privacy properties, as well as strong secrecy and game-based security properties, are stated as process equivalences, we focus on (time) trace equivalence. We show that actually, considering timing attacks does not add any complexity: time trace equivalence can be reduced to length trace equivalence, where the attacker no longer has access to execution times but can still compare the length of messages. We therefore deduce from a previous decidability result for length equivalence that time trace equivalence is decidable for bounded processes and the standard cryptographic primitives. As an application, we study several protocols that aim for privacy. In particular, we (automatically) detect an existing timing attack against the biometric passport and new timing attacks against the Private Authentication protocol. © Springer-Verlag Berlin Heidelberg 2015.
引用
收藏
页码:280 / 299
相关论文
共 50 条
  • [21] Towards a framework for autonomic security protocols
    Foley, SN
    Zhou, HB
    SECURITY PROTOCOLS, 2005, 3364 : 49 - 62
  • [22] A Verification Framework for Stateful Security Protocols
    Li, Li
    Dong, Naipeng
    Pang, Jun
    Sun, Jun
    Bai, Guangdong
    Liu, Yang
    Dong, Jin Song
    FORMAL METHODS AND SOFTWARE ENGINEERING, ICFEM 2017, 2017, 10610 : 262 - 280
  • [23] Security-proof framework for two-way Gaussian quantum-key-distribution protocols
    Zhuang, Quntao
    Zhang, Zheshen
    Lutkenhaus, Norbert
    Shapiro, Jeffrey H.
    PHYSICAL REVIEW A, 2018, 98 (03)
  • [24] Using the CORAL system to discover attacks on security protocols
    Steel, G
    Bundy, A
    Denney, E
    COMPUTER SYSTEMS: THEORY, TECHNOLOGY AND APPLICATIONS: A TRIBUTE TO ROGER NEEDHAM, 2004, : 279 - 285
  • [25] Formal verification of type flaw attacks in security protocols
    Long, BW
    ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2003, : 415 - 424
  • [27] An executable specification language for planning attacks to security protocols
    Aiello, LC
    Massacci, F
    13TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2000, : 88 - 102
  • [28] How to prevent type flaw attacks on security protocols
    Heather, J
    Lowe, G
    Schneider, S
    13TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2000, : 255 - 268
  • [29] On the Security and Performance of Proof-based Consensus Protocols
    Rebello, Gabriel Antonio F.
    Camilo, Gustavo F.
    Guimaraes, Lucas C. B.
    de Souza, Lucas Airam C.
    Duarte, Otto Carlos M. B.
    2020 4TH CONFERENCE ON CLOUD AND INTERNET OF THINGS, CIOT, 2020, : 67 - 74
  • [30] Analysis on Security Proof of Two Key Agreement Protocols
    Zhou, Huihua
    Zheng, Minghui
    NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 531 - +