2012
DOI: 10.1007/978-3-642-34638-5_2
|View full text |Cite
|
Sign up to set email alerts
|

Understanding the Weaknesses of Human-Protocol Interaction

Abstract: Abstract. A significant number of attacks on systems are against the non-cryptographic components such as the human interaction with the system. In this paper, we propose a taxonomy of human-protocol interaction weaknesses. This set of weaknesses presents a harmonization of many findings from different research areas. In doing so we collate the most common human-interaction problems that can potentially result in successful attacks against protocol implementations. We then map these weaknesses onto a set of de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 21 publications
0
6
0
Order By: Relevance
“…When implemented, the assumptions are replaced by dynamic user-interactions. When these assumptions are too strong, it becomes difficult to implement a protocol providing the expected security properties (Carlos and Price, 2012). By adding new components to the specification, such as users and different communication mediums, we can start to describe these assumptions in the ceremony, and consequently perform a more detailed analysis of them and their impact on the ceremony's security properties.…”
Section: A Proposed Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…When implemented, the assumptions are replaced by dynamic user-interactions. When these assumptions are too strong, it becomes difficult to implement a protocol providing the expected security properties (Carlos and Price, 2012). By adding new components to the specification, such as users and different communication mediums, we can start to describe these assumptions in the ceremony, and consequently perform a more detailed analysis of them and their impact on the ceremony's security properties.…”
Section: A Proposed Methodsmentioning
confidence: 99%
“…This leaves such implementations susceptible to failure, weakening the achievability of the protocol's goals due to the weakening of the assumptions. Additionally, implementations such as those we find in web browsers force users to authenticate digital objects (Certificates) which, according to some research findings, is not feasible (Carlos and Price, 2012).…”
Section: An Example Ceremonymentioning
confidence: 95%
See 1 more Smart Citation
“…They extend the ceremony analysis by proposing a layered model for integrated technical and technology practice analysis. Their approach is somewhat similar to human-protocol interaction layers defined by Carlos [11]. In network security systems, Karlof et al [12] proposed a concept of conditioned-safe ceremony which is a ceremony that deliberately conditions users to automatically take actions that protect them from an attack.…”
Section: Related Workmentioning
confidence: 98%
“…The major effort yet to be accomplished in the field of ceremony design and analysis is the modelling of the memory and processing performed by human nodes [10], [11], [12], [13]. Ceremony analysis provides a more complete understanding of the security threats surrounding the use of a protocol by a human than analysing the protocol alone.…”
Section: Introductionmentioning
confidence: 99%