On the Soundness of Infrastructure Adversaries

被引:0
|
作者
Dax, Alexander [1 ]
Kunnemann, Robert [1 ]
机构
[1] CISPA Helmholtz Ctr Informat Secur, Saarland Informat Campus, Saarbrucken, Germany
关键词
protocol verification; planning; security economics; DNSSEC; DNS; SECURITY; VERIFICATION; GENERATION; STRIPS;
D O I
10.1109/CSF51468.2021.00039
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Companies and network operators perform risk assessment to inform policy-making, guide infrastructure investments or to comply with security standards such as ISO 27001. Due to the size and complexity of these networks, risk assessment techniques such as attack graphs or trees describe the attacker with a finite set of rules. This characterization of the attacker can easily miss attack vectors or overstate them, potentially leading to incorrect risk estimation. In this work, we propose the first methodology to justify a rule-based attacker model. Conceptually, we add another layer of abstraction on top of the symbolic model of cryptography, which reasons about protocols and abstracts cryptographic primitives. This new layer reasons about Internet-scale networks and abstracts protocols. We show, in general, how the soundness and completeness of a rule-based model can be ensured by verifying trace properties, linking soundness to safety properties and completeness to liveness properties. We then demonstrate the approach for a recently proposed threat model that quantifies the confidentiality of email communication on the Internet, including DNS, DNSSEC, and SMTP. Using off-the-shelf protocol verification tools, we discover two flaws in their threat model. After fixing them, we show that it provides symbolic soundness.
引用
收藏
页码:345 / 360
页数:16
相关论文
共 50 条
  • [1] Soundness of digital signature in the presence of active adversaries
    Zhu Yu-na
    Wang Ya-di
    Han Ji-hong
    Zhang Chao
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 1352 - +
  • [2] Soundness of formal encryption in the presence of active adversaries
    Micciancio, D
    Warinschi, B
    [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2004, 2951 : 133 - 151
  • [3] Completing the picture:: Soundness of formal encryption in the presence of active adversaries
    Janvier, R
    Lakhnech, Y
    Mazaré, L
    [J]. PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2005, 3444 : 172 - 185
  • [4] Critical networked infrastructure protection from adversaries
    Quijano, Eduardo G.
    Rios Insua, David
    Cano, Javier
    [J]. RELIABILITY ENGINEERING & SYSTEM SAFETY, 2018, 179 : 27 - 36
  • [5] Identifying Adversaries' Signatures Using Knowledge Representations of Cyberattack Techniques on Cloud Infrastructure
    van der Merwe, Gilliam
    Muller, Christian
    van der Merwe, Wilhelm
    Blaauw, Dewald
    [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2022), 2022, : 333 - 339
  • [6] Combating Adversaries with Anti-adversaries
    Alfarra, Motasem
    Perez, Juan C.
    Thabet, Ali
    Bibi, Adel
    Torr, Philip H. S.
    Ghanem, Bernard
    [J]. THIRTY-SIXTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTY-FOURTH CONFERENCE ON INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE / THE TWELVETH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2022, : 5992 - 6000
  • [7] NOT ADVERSARIES
    WINGERTER, EJ
    [J]. WHARTON MAGAZINE, 1980, 4 (04): : 62 - 62
  • [8] ADVERSARIES
    CHANDLER, AD
    [J]. HARVARD BUSINESS REVIEW, 1979, 57 (06) : 88 - 92
  • [9] On simulatability soundness and mapping soundness of symbolic cryptography
    Backes, Michael
    Duermuth, Markus
    Kuesters, Ralf
    [J]. FSTTCS 2007: FOUNDATIONS OF SOFTWARE TECHNOLOGY AND THEORETICAL COMPUTER SCIENCE, PROCEEDINGS, 2007, 4855 : 108 - +
  • [10] Combining Adversaries with Anti-adversaries in Training
    Zhou, Xiaoling
    Yang, Nan
    Wu, Ou
    [J]. THIRTY-SEVENTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 37 NO 9, 2023, : 11435 - 11442