Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security 2017
DOI: 10.1145/3052973.3053000
|View full text |Cite
|
Sign up to set email alerts
|

A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol

Abstract: International audienceDistance-bounding protocols have been introduced to thwart relay attacks against contactless authentication protocols. In this context, veri-fiers have to authenticate the credentials of untrusted provers. Unfortunately , these protocols are themselves subject to complex threats such as terrorist-fraud attacks, in which a malicious prover helps an accomplice to authenticate. Provably guaranteeing the resistance of distance-bounding protocols to these attacks is a complex task. The classic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
32
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 29 publications
(32 citation statements)
references
References 26 publications
0
32
0
Order By: Relevance
“…It is therefore the first fully automated formal verification framework for distance-bounding protocols. With our automated verification, we identified unreported vulnerabilities in two recent protocols: a mafia-fraud and a distancehijacking attack on the TREAD protocol [24], and a distancefraud attack against the EMV-based contactless payment protocol PaySafe [25].…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…It is therefore the first fully automated formal verification framework for distance-bounding protocols. With our automated verification, we identified unreported vulnerabilities in two recent protocols: a mafia-fraud and a distancehijacking attack on the TREAD protocol [24], and a distancefraud attack against the EMV-based contactless payment protocol PaySafe [25].…”
Section: Resultsmentioning
confidence: 99%
“…To explain the overall methodology we use to analyse distance-bounding protocols, we perform a comprehensive analysis of the Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding (TREAD) protocol [24] in Section 6.1. Later on, in Section 6.2 we show and discuss the results of our automated verification.…”
Section: Automated Verificationmentioning
confidence: 99%
See 2 more Smart Citations
“…Indeed, the threat model for DB is in constant evolution [23], and new attacks appear regularly: [4,11] present more than 40 protocols, most of which are vulnerable to at least one attack. In particular, the notion of terrorist fraud and how to provably resist it lead to numerous publications, e.g., [5,21,24,39].…”
Section: Introductionmentioning
confidence: 99%