Implementing Security Protocol Monitors

09/07/2021
by   Yannick Chevalier, et al.
0

Cryptographic protocols are often specified by narrations, i.e., finite sequences of message exchanges that show the intended execution of the protocol. Another use of narrations is to describe attacks. We propose in this paper to compile, when possible, attack describing narrations into a set of tests that honest participants can perform to exclude these executions. These tests can be implemented in monitors to protect existing implementations from rogue behaviour.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/21/2022

Modelling Agent-Skipping Attacks in Message Forwarding Protocols

Message forwarding protocols are protocols in which a chain of agents ha...
research
06/15/2020

The EMV Standard: Break, Fix, Verify

EMV is the international protocol standard for smartcard payment and is ...
research
06/24/2018

WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring

We present WPSE, a browser-side security monitor for web protocols desig...
research
07/18/2022

From Infinity to Choreographies: Extraction for Unbounded Systems

Choreographies are formal descriptions of distributed systems, which foc...
research
06/30/2023

A Quic(k) Security Overview: A Literature Research on Implemented Security Recommendations

Built on top of UDP, the relatively new QUIC protocol serves as the base...
research
05/25/2022

The security of the Coordicide: the implementation and analysis of possible attack vectors

The goal of the thesis is to study and perform an analysis of the possib...
research
01/03/2020

Verifying Cryptographic Security Implementations in C Using Automated Model Extraction

This thesis presents an automated method for verifying security properti...

Please sign up or login with your details

Forgot password? Click here to reset