Paper published in a book (Scientific congresses, symposiums and conference proceedings)
Post-collusion security and distance bounding
Mauw, Sjouke; Smith, Zachary Daniel; Trujillo Rasua, Rolando et al.
2019In Post-collusion security and distance bounding
Peer reviewed
 

Files


Full Text
CCS19.pdf
Author postprint (966.1 kB)
Request a copy

All documents in ORBilu are protected by a user license.

Send to



Details



Keywords :
formal security; logic and verification; mobile and wireless security
Abstract :
[en] Verification of cryptographic protocols is traditionally built upon the assumption that participants have not revealed their long-term keys. However, in some cases, participants might collude to defeat some security goals, without revealing their long-term secrets. We develop a model based on multiset rewriting to reason about collusion in security protocols. We introduce the notion of postcollusion security, which verifies security properties claimed in sessions initiated after collusion occurred. We use post-collusion security to analyse terrorist fraud on protocols for securing physical proximity, known as distance-bounding protocols. In a terrorist fraud attack, agents collude to falsely prove proximity, whilst no further false proximity proof can be issued without further collusion. Our definitions and the Tamarin prover are used to develop a modular framework for verification of distance-bounding protocols that accounts for all types of attack from literature. We perform a survey of over 25 protocols, which include industrial protocols such as Mastercard’s contactless payment PayPass and NXP’s MIFARE Plus with proximity check. For the industrial protocols we confirm attacks, propose fixes, and deliver computer-verifiable security proofs of the repaired versions
Disciplines :
Computer science
Author, co-author :
Mauw, Sjouke ;  University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
Smith, Zachary Daniel ;  University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
Trujillo Rasua, Rolando ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) ; Deakin University > School of Info Technology > Lecturer
Toro Pozo, Jorge Luis ;  University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) ; ETH Zurich > Institute of Information Security > ISG
External co-authors :
yes
Language :
English
Title :
Post-collusion security and distance bounding
Publication date :
11 November 2019
Event name :
26th ACM Conference on Computer and Communications Security
Event place :
London, United Kingdom
Event date :
from 11-11-2019 to 15-11-2019
Main work title :
Post-collusion security and distance bounding
Peer reviewed :
Peer reviewed
Focus Area :
Security, Reliability and Trust
FnR Project :
FNR10188265 - Symbolic Verification Of Distance-bounding And Multiparty Authentication Protocols, 2015 (01/06/2015-31/05/2019) - Jorge Luis Toro Pozo
Available on ORBilu :
since 15 January 2020

Statistics


Number of views
89 (7 by Unilu)
Number of downloads
2 (2 by Unilu)

Scopus citations®
 
8
Scopus citations®
without self-citations
7

Bibliography


Similar publications



Contact ORBilu