Pretražite po imenu i prezimenu autora, mentora, urednika, prevoditelja

Napredna pretraga

Pregled bibliografske jedinice broj: 1100862

Actor Key Compromise: Consequences and Countermeasures


Basin, David; Cremers, Cas; Horvat, Marko
Actor Key Compromise: Consequences and Countermeasures // 2014 IEEE 27th Computer Security Foundations Symposium
Beč, Austrija: Institute of Electrical and Electronics Engineers (IEEE), 2014. str. 244-258 doi:10.1109/csf.2014.25 (predavanje, međunarodna recenzija, cjeloviti rad (in extenso), znanstveni)


CROSBI ID: 1100862 Za ispravke kontaktirajte CROSBI podršku putem web obrasca

Naslov
Actor Key Compromise: Consequences and Countermeasures

Autori
Basin, David ; Cremers, Cas ; Horvat, Marko

Vrsta, podvrsta i kategorija rada
Radovi u zbornicima skupova, cjeloviti rad (in extenso), znanstveni

Skup
2014 IEEE 27th Computer Security Foundations Symposium

Mjesto i datum
Beč, Austrija, 19.07.2014. - 22.07.2014

Vrsta sudjelovanja
Predavanje

Vrsta recenzije
Međunarodna recenzija

Ključne riječi
Security protocols ; security properties ; Key Compromise Impersonation ; adversary models ; TLS ; SSH

Sažetak
Despite Alice’s best efforts, her long-term secret keys may be revealed to an adversary. Possible reasons include weakly generated keys, compromised key storage, subpoena, and coercion. However, Alice may still be able to communicate securely with other parties, depending on the protocol used. We call the associated property resilience against Actor Key Compromise (AKC). We formalise this property in a symbolic model and identify conditions under which it can and cannot be achieved. In case studies that include TLS and SSH, we find that many protocols are not resilient against AKC. We implement a concrete AKC attack on the mutually authenticated TLS protocol.

Izvorni jezik
Engleski

Znanstvena područja
Matematika, Računarstvo



POVEZANOST RADA


Ustanove:
Prirodoslovno-matematički fakultet, Matematički odjel, Zagreb,
Prirodoslovno-matematički fakultet, Zagreb

Profili:

Avatar Url Marko Horvat (autor)

Poveznice na cjeloviti tekst rada:

doi ieeexplore.ieee.org

Citiraj ovu publikaciju:

Basin, David; Cremers, Cas; Horvat, Marko
Actor Key Compromise: Consequences and Countermeasures // 2014 IEEE 27th Computer Security Foundations Symposium
Beč, Austrija: Institute of Electrical and Electronics Engineers (IEEE), 2014. str. 244-258 doi:10.1109/csf.2014.25 (predavanje, međunarodna recenzija, cjeloviti rad (in extenso), znanstveni)
Basin, D., Cremers, C. & Horvat, M. (2014) Actor Key Compromise: Consequences and Countermeasures. U: 2014 IEEE 27th Computer Security Foundations Symposium doi:10.1109/csf.2014.25.
@article{article, author = {Basin, David and Cremers, Cas and Horvat, Marko}, year = {2014}, pages = {244-258}, DOI = {10.1109/csf.2014.25}, keywords = {Security protocols, security properties, Key Compromise Impersonation, adversary models, TLS, SSH}, doi = {10.1109/csf.2014.25}, title = {Actor Key Compromise: Consequences and Countermeasures}, keyword = {Security protocols, security properties, Key Compromise Impersonation, adversary models, TLS, SSH}, publisher = {Institute of Electrical and Electronics Engineers (IEEE)}, publisherplace = {Be\v{c}, Austrija} }
@article{article, author = {Basin, David and Cremers, Cas and Horvat, Marko}, year = {2014}, pages = {244-258}, DOI = {10.1109/csf.2014.25}, keywords = {Security protocols, security properties, Key Compromise Impersonation, adversary models, TLS, SSH}, doi = {10.1109/csf.2014.25}, title = {Actor Key Compromise: Consequences and Countermeasures}, keyword = {Security protocols, security properties, Key Compromise Impersonation, adversary models, TLS, SSH}, publisher = {Institute of Electrical and Electronics Engineers (IEEE)}, publisherplace = {Be\v{c}, Austrija} }

Citati:





    Contrast
    Increase Font
    Decrease Font
    Dyslexic Font