Is Eve nearby? Analysing protocols under the distant-attacker assumption

Reynaldo Gil-Pons, Ross Horne, Sjouke Mauw, Alwen Tiu, Rolando Trujillo-Rasua

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

1 Citation (Scopus)

Abstract

Various modern protocols tailored to emerging wire-less networks, such as body area networks, rely on the proximity and honesty of devices within the network to achieve their security goals. However, there does not exist a security framework that supports the formal analysis of such protocols, leaving the door open to unexpected flaws. In this article we introduce such a security framework, show how it can be implemented in the protocol verification tool Tamarin, and use it to find previously unknown vulnerabilities on two recent key exchange protocols.

Original languageEnglish
Title of host publication 2022 IEEE 35th Computer Security Foundations Symposium (CSF)
Place of PublicationPiscataway, NJ
PublisherIEEE
Pages17-32
Number of pages16
ISBN (Electronic)9781665484176
ISBN (Print)9781665484183
DOIs
Publication statusPublished - 31 Oct 2022
Event35th IEEE Computer Security Foundations Symposium, CSF 2022 - Haifa, Israel
Duration: 7 Aug 202210 Aug 2022

Publication series

NameIEEE Computer Security Foundations Symposium
Volume2022-August
ISSN (Print)1940-1434

Conference

Conference35th IEEE Computer Security Foundations Symposium, CSF 2022
Country/TerritoryIsrael
CityHaifa
Period7/08/2210/08/22

Keywords

  • distance bounding
  • distant attacker
  • formal verification
  • key exchange
  • security protocols

Fingerprint

Dive into the research topics of 'Is Eve nearby? Analysing protocols under the distant-attacker assumption'. Together they form a unique fingerprint.

Cite this