2007
DOI: 10.1007/978-3-540-75101-4_22
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0
1

Year Published

2010
2010
2012
2012

Publication Types

Select...
3
3

Relationship

4
2

Authors

Journals

citations
Cited by 11 publications
(22 citation statements)
references
References 18 publications
0
21
0
1
Order By: Relevance
“…In its current form, the MI intruder model utilizes message metadata comparisons (encryption characteristics, message timestamps and message sizes) for detecting attack actions that may be removed, without excluding any attacks that the analyst needs to check. Attack actions that can be removed are encoded into an open-ended base of primitive attacks (message replays, integrity violations, parallel session attacks and type-flaw attacks) that have been formalized in [15]. Since messages are compared one by one, our model and the used open-ended base of attack actions can be applied on analysis problems, where protocol participants exchange messages on a unicast communication basis.…”
Section: The MI Intruder Modelmentioning
confidence: 99%
See 3 more Smart Citations
“…In its current form, the MI intruder model utilizes message metadata comparisons (encryption characteristics, message timestamps and message sizes) for detecting attack actions that may be removed, without excluding any attacks that the analyst needs to check. Attack actions that can be removed are encoded into an open-ended base of primitive attacks (message replays, integrity violations, parallel session attacks and type-flaw attacks) that have been formalized in [15]. Since messages are compared one by one, our model and the used open-ended base of attack actions can be applied on analysis problems, where protocol participants exchange messages on a unicast communication basis.…”
Section: The MI Intruder Modelmentioning
confidence: 99%
“…Thus the intruder model is simplified and in effect performs only the necessary attacks. Each attack action belongs to one of the broad categories of attacks, which were formalized in [15] as specific sequences of "send" and "receive" actions. …”
Section: Message Metadatamentioning
confidence: 99%
See 2 more Smart Citations
“…SPIN is an automated model checker that aims to efficiently verifying (distributed) software systems. Its success has been proved through several case studies [7,8], where SPIN is used to trace design errors in distributed systems. It provides the capability of reporting flaws like model deadlocks, unspecified receptions, flags incompleteness, race conditions, unwarranted assumptions about the speeds of processes [9] and others.…”
Section: Introductionmentioning
confidence: 99%