Device Attacker Models: Fact and Fiction

被引:2
|
作者
Yu, Jiangshan [1 ]
Ryan, Mark D. [1 ]
机构
[1] Univ Birmingham, Sch Comp Sci, Birmingham B15 2TT, W Midlands, England
来源
SECURITY PROTOCOLS XXIII | 2015年 / 9379卷
基金
英国工程与自然科学研究理事会;
关键词
Attacker model; Key compromise detection; Key usage monitoring;
D O I
10.1007/978-3-319-26096-9_17
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
According to standard fiction, a user is able to securely keep long term keys on his device. However, in fact his device may become infected with malware, and an adversary may obtain a copy of his key. We propose an attacker model in which devices are "periodically trustworthy" - they may become infected by malware, and then later become trustworthy again after software patches and malware scans have been applied, in an ongoing cycle. This paper proposes a solution to make the usage of private keys by attackers detectable by using public transparently-maintained logs to monitor the usage of long-term secret keys.
引用
收藏
页码:158 / 167
页数:10
相关论文
共 50 条