Hiding in groups: On the expressiveness of privacy distributions

被引:0
作者
Nohl, Karsten [1 ]
Evans, David [1 ]
机构
[1] Univ Virginia, Dept Comp Sci, Charlottesville, VA 22903 USA
来源
PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE | 2008年
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Many applications inherently disclose information because perfect privacy protection is prohibitively expensive. RFID tags, for example, cannot be equipped with the cryptographic primitives needed to completely shield their information from unauthorized reads. All known privacy protocols that scale to the anticipated sizes of RFID systems achieve at most modest levels of protection. Previous analyses Found the protocols to have weak privacy, but relied on simplilying attacker models and did not provide insights into how to improve privacy. We introduce a new general way to model privacy through probability distributions, that capture how much information is leaked by different users of a system. We use this metric to examine information leakage for an RFID tag from the a scalable privacy protocol and from a timing side channel that is observable through the tag's random number generator. To increase the privacy of the protocol, we combine our results with a new model for rational attackers to derive the overall value of all attack. This attacker model is also based on distributions and integrates seamlessly into our framework For information leakage. Our analysis points to a new parametrization for the privacy protocol that significantly improves privacy by decreasing the expected attack value while maintaining reasonable scalability at acceptable cost.
引用
收藏
页码:1 / 15
页数:15
相关论文
共 16 条
  • [1] [Anonymous], 2005, CLASS 1 GEN 2 UHF AI
  • [2] [Anonymous], WORKSH RFID SEC
  • [3] Avoine G., 2005, SELECTED AREAS CRYPT
  • [4] AVOINE G, 2007, WORKSH TRUST SEC PRI
  • [5] Avoine G., 2005, FINANCIAL CRYPTOGRAP
  • [6] Buttyan L., 2006, WORKSH PRIV ENH TECH
  • [7] DAMGARD I, 2006, RFID SECURITY TRADEO
  • [8] JUELS A, 2006, DEFINING STRONG PRIV
  • [9] MOLNAR D, 2004, PRIVACY SECURITY LIB
  • [10] NOHL K, 2008, USENIX SECURITY