How Efficient are Replay Attacks against Vote Privacy? A Formal Quantitative Analysis

被引:3
|
作者
Mestel, David [1 ]
Mueller, Johannes [1 ,2 ]
Reisert, Pascal
机构
[1] Univ Luxembourg, SnT, Luxembourg, Luxembourg
[2] Univ Stuttgart, Stuttgart, Germany
关键词
D O I
10.1109/CSF54842.2022.9979167
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Replay attacks are among the most well-known attacks against vote privacy. Many e-voting systems have been proven vulnerable to replay attacks, including systems like Helios that are used in real practical elections. Despite their popularity, it is commonly believed that replay attacks are inefficient but the actual threat that they pose to vote privacy has never been studied formally. Therefore, in this paper, we precisely analyze for the first time how efficient replay attacks really are. We study this question from commonly used and complementary perspectives on vote privacy, showing as an independent contribution that a simple extension of a popular game-based privacy definition corresponds to a strong entropy-based notion. Our results demonstrate that replay attacks can be devastating for a voter's privacy even when an adversary's resources are very limited. We illustrate our formal findings by applying them to a number of real-world elections, showing that a modest number of replays can result in significant privacy loss. Overall, our work reveals that, contrary to a common belief, replay attacks can be very efficient and must therefore be considered a serious threat.
引用
收藏
页码:179 / 194
页数:16
相关论文
共 24 条
  • [1] How efficient are replay attacks against vote privacy? A formal quantitative analysis
    Mestel, David
    Muller, Johannes
    Reisert, Pascal
    [J]. JOURNAL OF COMPUTER SECURITY, 2023, 31 (05) : 421 - 467
  • [2] A formal analysis for capturing replay attacks in cryptographic protocols
    Gao, Han
    Bodei, Chiara
    Degano, Pierpaolo
    Nielson, Hanne Riis
    [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 150 - +
  • [3] Security analysis and fault detection against stealthy replay attacks
    Zaman, Amirreza
    Safarinejadian, Behrouz
    Birk, Wolfgang
    [J]. INTERNATIONAL JOURNAL OF CONTROL, 2022, 95 (06) : 1562 - 1575
  • [4] Formal Analysis of Vote Privacy Using Computationally Complete Symbolic Attacker
    Bana, Gergei
    Chadha, Rohit
    Eeralla, Ajay Kumar
    [J]. COMPUTER SECURITY (ESORICS 2018), PT II, 2018, 11099 : 350 - 372
  • [5] An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding
    Fan, Yanfei
    Jiang, Yixin
    Zhu, Haojin
    Shen, Xuemin
    [J]. IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 2213 - 2221
  • [6] Efficient Defenses Against Output Poisoning Attacks on Local Differential Privacy
    Song, Shaorui
    Xu, Lei
    Zhu, Liehuang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 5506 - 5521
  • [7] Efficient Privacy-Preserving Federated Learning Against Inference Attacks for IoT
    Miao, Yifeng
    Chen, Siguang
    [J]. 2023 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC, 2023,
  • [8] Formal analytics for stealthy attacks against Contingency Analysis in power grids
    Shahriar, Md Hasan
    Rahman, Mohammad Ashiqur
    Jafari, Mohamadsaleh
    Paudyal, Sumit
    [J]. SUSTAINABLE ENERGY GRIDS & NETWORKS, 2024, 38
  • [9] SPEFL: Efficient Security and Privacy-Enhanced Federated Learning Against Poisoning Attacks
    Shen, Liyan
    Ke, Zhenhan
    Shi, Jinqiao
    Zhang, Xi
    Sun, Yanwei
    Zhao, Jiapeng
    Wang, Xuebin
    Zhao, Xiaojie
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (08): : 13437 - 13451
  • [10] TEC-Tree: A low-cost, parallelizable tree for efficient defense against memory replay attacks
    Elbaz, Reouven
    Champagne, David
    Lee, Ruby B.
    Torres, Lionel
    Sassatelli, Gilles
    Guillemin, Pierre
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2007, PROCEEDINGS, 2007, 4727 : 289 - +