Adaptable Authentication Model: Exploring Security with Weaker Attacker Models

被引:0
|
作者
Ahmed, Naveed [1 ]
Jensen, Christian D. [1 ]
机构
[1] Tech Univ Denmark, Lyngby, Denmark
来源
关键词
PRIVACY MODELS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most methods for protocol analysis classify protocols as "broken" if they are vulnerable to attacks from a strong attacker, e.g., assuming the Dolev-Yao attacker model. In many cases, however, exploitation of existing vulnerabilities may not be practical and, moreover, riot all applications may suffer because of the identified vulnerabilities. Therefore, we may need to analyze a protocol for weaker notions of security. In this paper, we present a security model that supports such weaker notions. In this model, the overall goals of an authentication protocol are broken into a finer granularity; for each fine level authentication goal, we determine the "least strongest-attacker" for which the authentication goal can be satisfied. We demonstrate that this model can be used to reason about the security of supposedly insecure protocols. Such adaptability is particularly useful in those applications where one may need to trade-off security relaxations against resource requirements.
引用
收藏
页码:234 / 247
页数:14
相关论文
共 50 条
  • [1] From Attacker Models to Reliable Security
    Mantel, Heiko
    [J]. PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, : 547 - 547
  • [2] Incorporating attacker behavior in stochastic models of security
    Sallhammar, K
    Helvik, BE
    Knapskog, SJ
    [J]. SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, : 79 - 85
  • [3] Software Security: Vulnerabilities and Countermeasures for Two Attacker Models
    Piessens, Frank
    Verbauwhede, Ingrid
    [J]. PROCEEDINGS OF THE 2016 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2016, : 990 - 999
  • [4] Introducing GAMfIS: A Generic Attacker Model for Information Security
    Fraunholz, Daniel
    Duque Anton, Simon
    Schotten, Hans Dieter
    [J]. 2017 25TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2017, : 393 - 398
  • [5] Exploring Security and Authentication Issues in Internet of Things
    Prathibha, L.
    Fatima, Kaleem
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2018, : 673 - 678
  • [6] A quantitative model of the security intrusion process based on attacker behavior
    Jonsson, E
    Olovsson, T
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1997, 23 (04) : 235 - 245
  • [7] Adding authentication to model driven security
    Satoh, Fumiko
    Nakamura, Yuichi
    Ono, Koichi
    [J]. ICWS 2006: IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, PROCEEDINGS, 2006, : 585 - +
  • [8] An authentication model for multilevel security domains
    Jiang, YX
    Lin, C
    Tan, ZX
    [J]. 2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 1534 - 1539
  • [9] Grid Cyber-Security Strategy in an Attacker-Defender Model
    Chen, Yu-Cheng
    Mooney, Vincent
    Grijalva, Santiago
    [J]. 2020 CLEMSON UNIVERSITY POWER SYSTEMS CONFERENCE (PSC), 2020,
  • [10] Grid Cyber-Security Strategy in an Attacker-Defender Model
    Chen, Yu-Cheng
    Mooney, Vincent John, III
    Grijalva, Santiago
    [J]. CRYPTOGRAPHY, 2021, 5 (02)