Timing attacks in security protocols: Symbolic framework and proof techniques

被引:9
|
作者
Cheval, Vincent [1 ,2 ]
Cortier, Véronique [1 ]
机构
[1] LORIA, CNRS, France
[2] School of Computing, University of Kent, United Kingdom
基金
欧洲研究理事会;
关键词
Calculations - Network security - Computability and decidability;
D O I
10.1007/978-3-662-46666-7_15
中图分类号
学科分类号
摘要
We propose a framework for timing attacks, based on (a variant of) the applied-pi calculus. Since many privacy properties, as well as strong secrecy and game-based security properties, are stated as process equivalences, we focus on (time) trace equivalence. We show that actually, considering timing attacks does not add any complexity: time trace equivalence can be reduced to length trace equivalence, where the attacker no longer has access to execution times but can still compare the length of messages. We therefore deduce from a previous decidability result for length equivalence that time trace equivalence is decidable for bounded processes and the standard cryptographic primitives. As an application, we study several protocols that aim for privacy. In particular, we (automatically) detect an existing timing attack against the biometric passport and new timing attacks against the Private Authentication protocol. © Springer-Verlag Berlin Heidelberg 2015.
引用
收藏
页码:280 / 299
相关论文
共 50 条
  • [31] A Framework for Differential Privacy Against Timing Attacks
    Ratliff, Zachary
    Vadhan, Salil
    arXiv,
  • [32] Automatic Verification of Security Protocols in the Symbolic Model: The Verifier Proverif
    Blanchet, Bruno (Bruno.Blanchet@inria.fr), 1600, Springer Verlag (8604):
  • [33] Computational Soundness of Coinductive Symbolic Security under Active Attacks
    Hajiabadi, Mohammad
    Kapron, Bruce M.
    THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 539 - 558
  • [34] Security Protocols Against Cyber Attacks in the Distribution Automation System
    Lim, I. H.
    Hong, S.
    Choi, M. S.
    Lee, S. J.
    Kim, T. W.
    Lee, S. W.
    Ha, B. N.
    IEEE TRANSACTIONS ON POWER DELIVERY, 2010, 25 (01) : 448 - 455
  • [35] Design Requirements to Counter Parallel Session Attacks in Security Protocols
    Jurcut, Anca D.
    Coffey, Tom
    Dojen, Reiner
    2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 298 - 305
  • [36] Detecting Failed Attacks on Human-Interactive Security Protocols
    Roscoe, A. W.
    SECURITY PROTOCOLS XXIV, 2017, 10368 : 181 - 197
  • [37] Security and efficiency in authentication protocols resistant to password guessing attacks
    Kwon, T
    Song, JS
    LCN'97 - 22ND ANNUAL CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 1997, : 245 - 252
  • [38] On the security of Girault key agreement protocols against active attacks
    Oh, SH
    Mambo, M
    Shizuya, H
    Won, DH
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (05): : 1181 - 1189
  • [39] Migration of Internet security protocols to the IPSEC framework
    Sierra, JM
    Hernández, JC
    Ribagorda, A
    Jayaram, N
    36TH ANNUAL 2002 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2002, : 134 - 143
  • [40] Smart grid security: Attacks and defence techniques
    Kim, Yoonjib
    Hakak, Saqib
    Ghorbani, Ali
    IET SMART GRID, 2023, 6 (02) : 103 - 123