Modelling Agent-Skipping Attacks in Message Forwarding Protocols

01/21/2022
by   Zach Smith, et al.
0

Message forwarding protocols are protocols in which a chain of agents handles transmission of a message. Each agent forwards the received message to the next agent in the chain. For example, TLS middleboxes act as intermediary agents in TLS, adding functionality such as filtering or compressing data. In such protocols, an attacker may attempt to bypass one or more intermediary agents. Such an agent-skipping attack can the violate security requirements of the protocol. Using the multiset rewriting model in the symbolic setting, we construct a comprehensive framework of such path protocols. In particular, we introduce a set of security goals related to path integrity: the notion that a message faithfully travels through participants in the order intended by the initiating agent. We perform a security analysis of several such protocols, highlighting key attacks on modern protocols.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/07/2021

Implementing Security Protocol Monitors

Cryptographic protocols are often specified by narrations, i.e., finite ...
research
05/26/2023

Panini – Anonymous Anycast and an Instantiation

Anycast messaging (i.e., sending a message to an unspecified receiver) h...
research
02/04/2019

On Enactability and Monitorability of Agent Interaction Protocols

Interactions between agents are usually designed from a global viewpoint...
research
02/04/2019

On the Enactability of Agent Interaction Protocols: Toward a Unified Approach

Interactions between agents are usually designed from a global viewpoint...
research
12/13/2018

Security and Privacy Implications of Middlebox Cooperation Protocols

This white paper presents an analysis done by the MAMI project of the pr...
research
07/16/2019

Broadcast Distributed Voting Algorithm in Population Protocols

We consider the problem of multi-choice majority voting in a network of ...
research
02/09/2020

Message Type Identification of Binary Network Protocols using Continuous Segment Similarity

Protocol reverse engineering based on traffic traces infers the behavior...

Please sign up or login with your details

Forgot password? Click here to reset