共 50 条
Device Attacker Models: Fact and Fiction
被引:2
|作者:
Yu, Jiangshan
[1
]
Ryan, Mark D.
[1
]
机构:
[1] Univ Birmingham, Sch Comp Sci, Birmingham B15 2TT, W Midlands, England
来源:
基金:
英国工程与自然科学研究理事会;
关键词:
Attacker model;
Key compromise detection;
Key usage monitoring;
D O I:
10.1007/978-3-319-26096-9_17
中图分类号:
TP3 [计算技术、计算机技术];
学科分类号:
0812 ;
摘要:
According to standard fiction, a user is able to securely keep long term keys on his device. However, in fact his device may become infected with malware, and an adversary may obtain a copy of his key. We propose an attacker model in which devices are "periodically trustworthy" - they may become infected by malware, and then later become trustworthy again after software patches and malware scans have been applied, in an ongoing cycle. This paper proposes a solution to make the usage of private keys by attackers detectable by using public transparently-maintained logs to monitor the usage of long-term secret keys.
引用
收藏
页码:158 / 167
页数:10
相关论文