2014
DOI: 10.1145/2658996
|View full text |Cite
|
Sign up to set email alerts
|

Know Your Enemy

Abstract: We present a symbolic framework, based on a modular operational semantics, for formalizing different notions of compromise relevant for the design and analysis of cryptographic protocols. The framework's rules can be combined to specify different adversary capabilities, capturing different practically-relevant notions of key and state compromise. The resulting adversary models generalize the models currently used in different domains, such as security models for authenticated key exchange. We extend an existin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 25 publications
(4 citation statements)
references
References 50 publications
(92 reference statements)
0
4
0
Order By: Relevance
“…The justification is that practical scenarios exist in which one, but not the other, might be compromised. (Further discussion can be found in [1]. )…”
Section: Background On Ake Security Modelsmentioning
confidence: 98%
“…The justification is that practical scenarios exist in which one, but not the other, might be compromised. (Further discussion can be found in [1]. )…”
Section: Background On Ake Security Modelsmentioning
confidence: 98%
“…We adopt the methodology from [5] with some adaptations to our protocol. An adversary model, as defined in [5], is a combination of adversarial compromise.…”
Section: A Adversary Modelmentioning
confidence: 99%
“…We adopt the methodology from [5] with some adaptations to our protocol. An adversary model, as defined in [5], is a combination of adversarial compromise. To outline our model, we consider four dimensions of adversarial compromise: which kind of data is compromised, whose data it is, when the compromise occurs and which type of compromise it is.…”
Section: A Adversary Modelmentioning
confidence: 99%
“…Attacker Models for Dynamic Compromise. While our model of dynamic compromise is specific to secure compilation of unsafe languages, related notions of compromise have been studied in the setting of cryptographic protocols, where, for instance, a participant's secret keys could inadvertently be leaked to a malicious adversary, who could then use them to impersonate the victim [16,17,28,32]. This model is also similar to Byzantine behavior in distributed systems [19,53], in which the "Byzantine failure" of a node can cause it to start behaving in an arbitrary way, including generating arbitrary data, sending conflicting information to different parts of the system, and pretending to be a correct node.…”
Section: Related Workmentioning
confidence: 99%