In security protocol analysis, the traditional choice to consider a single Dolev-Yao attacker is supported by the fact that models with multiple collaborating Dolev-Yao attackers have been shown to be reducible to models with one Dolev-Yao attacker. In this paper, we take a fundamentally different approach and investigate the case of multiple non-collaborating attackers. After formalizing the framework for multi-attacker scenarios, we show with a case study that concurrent competitive attacks can interfere with each other. We then present a new strategy to defend security protocols, based on active exploitation of attack interference. The paper can be seen as providing two proof-of-concept results: (i) it is possible to exploit interference...
Since Needham and Schroeder introduced the idea of an ac-tive attacker, a lot of research has been m...
International audienceWhen trying to prove the security of a protocol, one usually analyzes the prot...
Abstract. Logics for security protocol analysis require the formalization of an adversary model that...
Traditionally security protocol analysis relies on a single Dolev-Yao attacker. This type of attacke...
Security protocols are often found to be flawed after their deployment. We present an approach that ...
Security protocols are often found to be flawed after their deployment. We present an approach that ...
Although computer security typically revolves around threats, attacks and defenses, the sub-field of...
In scenarios with multiple non-collaborating at- tackers, interference between simultaneous attack p...
Formal modeling and verification of security protocols typically assumes that a protocol is executed...
Formal modeling and verification of security protocols typically assumes that a protocol is executed...
AbstractThis paper contributes to further closing the gap between formal analysis and concrete imple...
This paper contributes to further closing the gap between formal analysis and concrete implementatio...
Due to the development of easy-to-use software, distributed denial of service attacks have gone from...
. There are many cases in the literature in which reuse of the same key material for different funct...
Security protocols intend to give their parties reasonable assurance that certain security propertie...
Since Needham and Schroeder introduced the idea of an ac-tive attacker, a lot of research has been m...
International audienceWhen trying to prove the security of a protocol, one usually analyzes the prot...
Abstract. Logics for security protocol analysis require the formalization of an adversary model that...
Traditionally security protocol analysis relies on a single Dolev-Yao attacker. This type of attacke...
Security protocols are often found to be flawed after their deployment. We present an approach that ...
Security protocols are often found to be flawed after their deployment. We present an approach that ...
Although computer security typically revolves around threats, attacks and defenses, the sub-field of...
In scenarios with multiple non-collaborating at- tackers, interference between simultaneous attack p...
Formal modeling and verification of security protocols typically assumes that a protocol is executed...
Formal modeling and verification of security protocols typically assumes that a protocol is executed...
AbstractThis paper contributes to further closing the gap between formal analysis and concrete imple...
This paper contributes to further closing the gap between formal analysis and concrete implementatio...
Due to the development of easy-to-use software, distributed denial of service attacks have gone from...
. There are many cases in the literature in which reuse of the same key material for different funct...
Security protocols intend to give their parties reasonable assurance that certain security propertie...
Since Needham and Schroeder introduced the idea of an ac-tive attacker, a lot of research has been m...
International audienceWhen trying to prove the security of a protocol, one usually analyzes the prot...
Abstract. Logics for security protocol analysis require the formalization of an adversary model that...